Why Shadow APIs are More Dangerous than You Think
Shadow APIs are a growing risk for organizations of all sizes as they can mask malicious behavior and induce substantial...
Read more →Shadow APIs are a growing risk for organizations of all sizes as they can mask malicious behavior and induce substantial...
Read more →Apr 13, 2023Ravie LakshmananMalware / Cyber Attack The Transparent Tribe threat actor has been linked to a set of weaponized...
Read more →Apr 13, 2023Ravie LakshmananCyber Attack / Cyber Threat The North Korean threat actor known as the Lazarus Group has been...
Read more →Apr 13, 2023Ravie LakshmananSoftware Security / Bug Hunting OpenAI, the company behind the massively popular ChatGPT AI chatbot, has launched...
Read more →Here’s a hard question to answer: ‘How many service accounts do you have in your environment?’. A harder one is:...
Read more →Threat actors using hacking tools from an Israeli surveillanceware vendor named QuaDream targeted at least five members of civil society...
Read more →Apr 12, 2023Ravie LakshmananPatch Tuesday / Software Updates It’s the second Tuesday of the month, and Microsoft has released another...
Read more →Apr 12, 2023Ravie LakshmananSoftware Security / Cyber Attack Enterprise communications service provider 3CX confirmed that the supply chain attack targeting...
Read more →Apr 11, 2023Ravie LakshmananCloud Security / Data Security A “by-design flaw” uncovered in Microsoft Azure could be exploited by attackers...
Read more →Apr 11, 2023Ravie LakshmananMobile Security / Malware Malicious loader programs capable of trojanizing Android applications are being traded on the...
Read more →Apr 11, 2023The Hacker NewsCybersecurity / Guide In today’s perilous cyber risk landscape, CISOs and CIOs must defend their organizations...
Read more →Apr 11, 2023Ravie LakshmananSoftware Security / Cryptocurrency Cybersecurity researchers have detailed the inner workings of the cryptocurrency stealer malware that...
Read more →