Features

services, Palo Alto, AD Active Directory microservices

Palo Alto Networks Shines Light on Application Services Security Challenge

An analysis published by Palo Alto Networks finds a typical large organization adds or updates over 300 services every month, with those new and updated services being responsible for approximately 32% of new high or critical cloud exposures ... Read More
backdoor RFID contactless card

Backdoor in RFID Cards for Offices, Hotels Can Lead to Instant Cloning

A backdoor found in millions of Chinese-made RFID cards that are used by hotels and other businesses around the world can let bad actors instantly clone the cards to gain unauthorized access into rooms or run supply chain attacks, say researchers with Paris-based Quarkslab ... Read More
SaaS, AppSec, bots standing AppSec DNSSEC web app security

Survey Surfaces Growing SaaS Application Security Concerns

| | AppSec, Cybersecurity, SaaS
A survey of 300 application and software development, IT and security leaders finds nearly half (45%) working for organizations that, in the past year, have experienced a cybersecurity incident involving a third-party software-as-a-service (SaaS) application ... Read More
deep fake, identity governance security Spera deepfake identity management

McAfee Unveils Tool to Identify Potential Deep Fakes

McAfee today added a tool to detect deep fakes to its portfolio that will initially be made available on PCs from Lenovo that are optimized to run artificial intelligence (AI) applications ... Read More
Veeam, recovery, sensitive, data, cyber resilience, ransomware loanDepot financial services

Survey Surfaces Widespread Mishandling of Sensitive Data

Perforce Software today published a survey of 250 IT professionals that finds the amount of sensitive data residing in non-production environments is rising as organizations embrace artificial intelligence (AI) and digital business transformation ... Read More
cloud security, extortion, Palo Alto, AWS

Extortion Group Exploits Cloud Misconfigurations, Targets 110,000 Domains

An unknown threat group leveraged publicly exposed environment variables in organizations' AWS accounts to exfiltrate sensitive data and demand ransoms in a wide-ranging extortion campaign that targeted 110,000 domains ... Read More
Microsoft Google 2FA MFA Azure

Mandatory MFA is Coming to Microsoft Azure

Microsoft is making MFA mandatory for signing into Azure accounts, the latest step in the IT vendor's Secure Future Initiative that it expanded in May in the wake of two embarrassing breaches by Russian and Chinese threat groups ... Read More
China, threats, scams, CISA TP-Link Volt Typhoon

Lawmakers Ask for Probe of Chinese Router Maker TP-Link

Two U.S. lawmakers are asking the Commerce Department to investigate whether the Wi-Fi routers built by Chinese company TP-Link could be used by Chinese-sponsored threat groups to infiltrate U.S. government and private networks, posing a security risk to the country ... Read More
ransomware, resilience, cyber, ransomware, report

Ransomware Surge Exploits Cybersecurity Gaps Caused by M&A

Evolving threat actor tactics are capitalizing on business and technology consolidation to launch widespread ransomware attacks and requiring organizations to rethink how to address new vulnerabilities to stay secure and resilient ... Read More

Application Security Check Up