The Forgotten Endpoint: Security Risks of Dormant Devices – Dark Reading
Technology Talk: That forgotten notebook holds plenty of secrets to enterprise access. – Read More
Technology Talk: That forgotten notebook holds plenty of secrets to enterprise access. – Read More
The NPM package for Axios, a popular JavaScript HTTP client library, was briefly compromised this week, possibly by North Korean threat actors. – Read More
Attackers compromised the npm account of the lead maintainer of Axios, a widely used JavaScript HTTP client library, and used it to publish malicious versions of the package that deployed…
Palo Alto researchers show how attackers could exploit AI agents on Google’s Vertex AI to steal data and break into restricted cloud infrastructure. – Read More
The threat group’s shift to speedy attacks on AWS, Azure, and SaaS instances shows organizations need to respond quickly to compromised credentials. – Read More
A vulnerability misclassified five months ago as a denial-of-service issue in F5 BIG-IP Access Policy Manager (APM) turned out to be a critical pre-authentication remote code execution flaw that is…
Google on Monday said it’s officially rolling out Android developer verification to all developers to combat the problem of bad actors distributing harmful apps while “hiding behind anonymity.” The development…
A high-severity security flaw in the TrueConf client video conferencing software has been exploited in the wild as a zero-day as part of a campaign targeting government entities in Southeast…
Intruder’s Chris Wallis argues mid-market teams should prioritize CVE remediation speed over vulnerability counts, while expanding defenses beyond CVEs to include attack surface management. – Read More
In a conversation with Dark Reading’s Terry Sweeney, DigiCert CEO Amit Sinha explains how AI-driven identities and quantum threats are reshaping the foundations of digital trust. – Read More
The Court of Appeal has today (31 March) handed down its long-awaited judgment in Mazur v Charles Russell Speechlys LLP, overturning the High Court’s restrictive interpretation of who may conduct…
(Sponsored content.) Mitigo helps law firms assess their exposure, close the gaps and build lasting resilience. – Read More
Iranian APTs are blurring the lines between state-sponsored and cybercriminal activities to target high-impact US organizations. – Read More
Cybersecurity researchers have disclosed a security “blind spot” in Google Cloud’s Vertex AI platform that could allow artificial intelligence (AI) agents to be weaponized by an attacker to gain unauthorized…
OpenAI has fixed two flaws in its AI stack that could allow AI agents to move sensitive data in unintended ways. The issues, disclosed by researchers at BeyondTrust and Check…