Cloud Security
Spoofed Rocket Alert App Targets Israeli Android Users with Spyware
As violence and protests spread in the chaotic war between Israel and Hamas, evidence of the parallel battle going on in cyberspace continue to emerge. It started almost immediately after the initial ...
Digital Identity Firms Being Bolstered by Investments
Investment money is flowing into a fast-growing digital identity solutions market that is being fueled by the ongoing increase in data breaches launched via identity scams, a government focus on the issue, ...
Why Mutual TLS (Mtls) Is Critical For Securing Microservices Communications In A Service Mesh
The rise of containerization and Kubernetes has catalyzed a widespread adoption of microservices architecture for packaging and deploying cloud-native applications. According to a recent report, 85% of surveyed companies said they are ...
Cisco Zero-Day: As Bad as it Gets — and No Fix 4 Weeks in
Keeping us in suspense—It doesn’t get worse than this: CVE-2023-20198 is CVSS=10 ...
Taking Stock of Identity Solutions in the Age of AI
Security pros can use ITDR and DCI in conjunction to combat security threats in the age of AI ...
RomCom Malware Group Targets EU Gender Equality Summit
A hacker group that continues to extend its reach from financially motivated attacks into cyber-espionage this summer targeted attendees of a gender equality conference with a pared-down version of the RomCom remote ...
Elon’s CSAM FAIL: Twitter Fined by Australian Govt.
Straya strikes back: Musk’s mob declines to answer questions, breaking law dunundah ...
Microsoft Launches an AI Bug Bounty Program
As Microsoft aggressively integrates AI into its broad portfolio of products and services, the IT giant now is looking for help to ensure they are free of vulnerabilities. The company this month ...
Did You Miss it? Top 5 Best Moments from the ACCESS Summit
Reading Time: 6 minutes Sonrai Security hosted the inaugural ACCESS: The Cloud Identity, Access, and Permissions Summit this October. The ACCESS Summit is a free, virtual, and learning-based summit gathering cloud experts ...
NSA Releases EliteWolf GitHub Repository for Securing OT Environments
The National Security Agency released a code repository in GitHub to make it easier for critical infrastructure organizations and similar entities to better identify and detect potentially malicious activities in their operational ...