Advanced Threat Protection

Shai-Hulud 2.0 Worm Threatens Cloud and Software Security

Analytics Intelligence

Shai-Hulud 2.0 Worm Threatens Cloud and Software Security

What happens when a single click on a deceptive email unleashes chaos across cloud systems and software ecosystems? In a world increasingly reliant on digital infrastructure, a new menace has emerged, striking at the heart of open-source platforms an

Analytics Intelligence Why Are Hacktivists Targeting Industrial Control Systems?

Imagine a water treatment plant suddenly going offline, not due to a mechanical failure, but because a group of hacktivists has defaced its digital interface with political messages. This isn’t a far-fetched scenario but a growing reality in the world of cybersecurity, where industrial control s

Why Are Hacktivists Targeting Industrial Control Systems?
Business Perspectives Protecting Aircraft Cabin IoT Privacy at the Source

Cabin connectivity promised seamless service, but the reality is a crowded publish–subscribe network where dozens of vendors’ devices trade messages in milliseconds while quietly expanding an internal attack surface that traditional defenses do not touch. Transport encryption locks down links, and b

Protecting Aircraft Cabin IoT Privacy at the Source
Business Perspectives How Did Microsoft Deflect a Record 15.7 Tbps IoT DDoS?

Lead Fifteen point seventy-two terabits per second of hostile traffic hit one Australian cloud endpoint as 3.64 billion packets per second rode the surge, and the page that flood tried to drown never blinked. The blast came from more than 500,000 source IPs, surged in bursts, and still met an

How Did Microsoft Deflect a Record 15.7 Tbps IoT DDoS?
Hackers & Threats Can DoorDash Break the Cycle of Social Engineering Breaches?

A Knock That Sounds Familiar Two rings, a pause, then a persuasive voice claiming to be “vendor support” with urgent instructions to verify access before the next shift—a script that has fooled seasoned professionals and, this fall, pried open a new entry point at DoorDash through a targeted social

Can DoorDash Break the Cycle of Social Engineering Breaches?
Hackers & Threats Did Gainsight's Attack Expose a Systemic SaaS Weakness?

When one trusted integration can unlock many doors across a customer data stack, the path from small misstep to large breach becomes frighteningly short and painfully predictable. The recent pattern of OAuth thefts and extortion claims turned a niche integration issue into a wake-up call for anyone

Did Gainsight's Attack Expose a Systemic SaaS Weakness?
Analytics Intelligence Critical Fluent Bit Flaws Put Telemetry Pipelines at Risk

Security teams counting on clean, high‑volume telemetry suddenly faced a stark reminder that the pipeline itself can become the point of failure when the agent at its core is exploitable and ubiquitous across cloud estates, Kubernetes clusters, and SaaS backbones. Researchers uncovered critical f

Critical Fluent Bit Flaws Put Telemetry Pipelines at Risk
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address