Ermetic released CNAPPgoat, an open-source project that allows organizations to test their cloud security skills, processes, tools, and posture in interactive sandbox environments that are easy to deploy and... Read more »
Amid a recent uptick in cybercrime on local governments, cities have been left to recover for months after the initial attack. For example, leaders in Dallas, Texas are ready... Read more »
A group of international researchers has achieved a breakthrough in computer security by developing a new and highly efficient cipher for cache randomization. The innovative cipher, designed by Assistant... Read more »
AI professionals are still facing some very real challenges in democratizing data, much less AI (much less Generative AI), across their organizations, according to Dataiku. While the global survey... Read more »
Sonar announced a significant advancement of its Clean Code offering – developers can now automatically discover and fix code security issues arising from interactions between user source code and... Read more »
The Guardio research team discovered an email phishing campaign exploiting a zero-day vulnerability in Salesforce’s legitimate email services and SMTP servers. Phishing email sample as was sent from the... Read more »
Traceable AI introduced digital fraud prevention capabilities, to deliver protection against fraudulent activities across APIs and digital interfaces. This innovation is crucial, especially in the post-COVID era, as businesses... Read more »
1Password announced the appointment of Melton Littlepage as its Chief Marketing Officer (CMO). With over 20 years of experience driving innovation, category creation, and growth across global security and... Read more »
Armis announced a strategic partnership with international cybersecurity consulting firm, Security Risk Advisors (SRA). This collaboration empowers joint customers as both organizations leverage their respective areas of expertise to... Read more »
Mitiga researchers have documented a new post-exploitation technique attackers can use to gain persistent remote access to AWS Elastic Compute Cloud (EC2) instances (virtual servers), as well as to... Read more »
