-
Cloud Security
Crawl, Walk, Run: Operationalizing Your IaC Security Program
You’ve decided to shift your cloud security left. You researched vendors, evaluated solutions, did a proof of concept and now…
-
Cloud Security
How To Prevent the IaC Misconfiguration Snowball Effect
The goal with infrastructure as code (IaC) frameworks such as Terraform and CloudFormation is to make infrastructure provisioning more efficient.…
-
Breaches
Enterprise Credentials at Risk – Same Old, Same Old?
Nov 07, 2025The Hacker NewsData Protection / Cloud Security Imagine this: Sarah from accounting gets what looks like a routine…
-
Breaches
SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach
Nov 06, 2025Ravie LakshmananIncident Response / Cloud Security SonicWall has formally implicated state-sponsored threat actors as behind the September security…
-
Threats
ASyncRat surpasses Dridex, TrickBot and Emotet to become dominant email threat
A review of what’s changed in malware in 2022, and what hasn’t, based on Adam Kujawa’s talk at RSAC 2022.…
-
Threats
Credential-stealing malware disguises itself as Telegram, targets social media users
Spyware.FFDroider is an information stealer that exfiltrates browser data in an attempt to steal credentials and valid session cookies. A…
-
Cloud Security
Prevent Secret Leaks: Find and Secure Secrets Across Your Repositories and Pipelines
Developers use secrets to enable their applications to securely communicate with other services. Hardcoding credentials (like usernames and passwords) simplifies…
-
Cloud Security
You Must Comply! Why You Need Proactive Open-Source License Compliance
As vulnerabilities in open-source code continue to play a prominent role in headline-grabbing exploits, such as Heartbleed and Log4Shell, a…
-
Breaches
Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response
Nov 06, 2025The Hacker NewsUnited States Bitdefender has once again been recognized as a Representative Vendor in the Gartner® Market…
-
Breaches
U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud
Nov 05, 2025Ravie LakshmananCybercrime / Ransomware The U.S. Treasury Department on Tuesday imposed sanctions against eight individuals and two entities…