RunC Flaws Enable Container Escapes, Granting Attackers Host Access
Jan 31, 2024NewsroomSoftware Security / Linux Multiple security vulnerabilities have been disclosed in the runC command line tool that could be exploited by threat actors…
Jan 31, 2024NewsroomSoftware Security / Linux Multiple security vulnerabilities have been disclosed in the runC command line tool that could be exploited by threat actors…
US officials said they disrupted a sweeping Chinese cyber-spying operation that targeted critical American infrastructure entities and could be used against the United States in…
A proof-of-concept (PoC) exploit for a local privilege elevation flaw impacting at least seven Android original equipment manufacturers (OEMs) is now publicly available on GitHub.…
Imagine you’re on a boat, navigating through the ever-changing waters of the tech world. SaaS applications are like the currents – powerful and essential, but…
Home Affairs’ long-time CIO Radi Kovacevic has been elevated to lead the technology and major capability group on an acting basis. Kovacevic’s move means the…
CISA adds Apple improper authentication bug to its Known Exploited Vulnerabilities catalog Pierluigi Paganini January 31, 2024 U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds…
Car rental company Europcar says it has not suffered a data breach and that shared customer data is fake after a threat actor claimed to…
Hackers exploit zero-day vulnerabilities in Ivanti VPN, deploying malware and cryptocurrency miners, with targets including Fortune 500 firms, gov’t agencies, and defence contractors. Cybersecurity concerns…
31 Jan The Spiraling SaaS Stack: Real-Life Case Study of How a $10B Enterprise Regained Control to Keep SaaS Data Secure Posted at 12:40h in…
Italy’s Data Protection Authority (GPDP) has uncovered data privacy violations related to collecting personal data and age protections after an inquiry into OpenAI’s ChatGPT. OpenAI…
The FBI has disrupted the KV Botnet used by Chinese Volt Typhoon state hackers to evade detection during attacks targeting U.S. critical infrastructure. The hacking…
The growth of our digital footprints has resulted in concerns about online identity security. Traditional passwords systems have become outdated, creating fertile ground for increasingly…