cybersecurity news
-
Mobile
Google is indexing the phone numbers of WhatsApp Users
A researcher is warning that Google is indexing the phone numbers of WhatsApp users raising serious privacy concerns. Google is…
-
Web Applications
Magento Based Stores See Biggest Attack Due to 0day flaw
Well-known cybersecurity expert and founder of Sanguine Security (SanSec) Willem de Groot (Willem de Groot) warned of the largest ever campaign aimed…
-
Cloud Security
6 Key Kubernetes DevSecOps Principles: People, Processes, Technology
Container-based application deployment is at its peak, as is the popularity of orchestration platforms like Kubernetes that form the underlying…
-
Cloud Security
9 Essential Infrastructure Security Considerations for Kubernetes
Part of the reason why securing Kubernetes can be challenging is that Kubernetes isn’t a single, simple framework. It’s a…
-
Cloud Security
Software Composition Analysis (SCA): How Does It Help Keep Cloud Applications Secure?
In this cloud-native world, applications are more assembled than built. Instead of starting from scratch, developers leverage ready-made code components…
-
Cloud Security
Web Application Firewalls (WAFs): What You Need To Know About the Security Checkpoint for Your Web Application
When you’re developing a cloud-native web application, it can feel as if you’re building a kingdom. The success of your…
-
Cloud Security
Building the Business Case for DevSecOps
“Resistance to change is proportional to how much the future might be altered by any given act.” — Stephen King…
-
Cloud Security
What is Infrastructure as Code? The Best Way to Fully Control Your Cloud Configuration
Cloud-first computing has taken the tech world by storm, and for good reason. Cloud native infrastructure gives developers and organizations…
-
Threat Intelligence
Microsoft to Block Excel Add-ins to Stop Office Exploits
Microsoft plans to add a feature to Office Excel that will make it harder for cyberattackers to exploit the spreadsheet…
-
Threat Intelligence
‘DragonSpark’ Malware: East Asian Cyberattackers Create an OSS Frankenstein
We imagine that the world’s most successful hackers write their own dangerous code and invest heavily in the technologies they…