The Numbers Are In: Identity-Based Attacks (Still) Reign Supreme in 2022
By Greg Notch, CISO, Expel The list of challenges security professionals face will not let up, as new […] The…
By Greg Notch, CISO, Expel The list of challenges security professionals face will not let up, as new […] The…
A sophisticated phishing kit has been targeting North Americans since mid-September, using lures focused on holidays like Labor Day and…
A service that allows organizations to back up data in the cloud can accidentally leak sensitive data to the public…
The OpenSSL Project has patched two high-severity security flaws in its open-source cryptographic library used to encrypt communication channels and…
On-chip solutions aim to prevent breaches by separating the computing element and keeping data in the secure vault at all…
A new open-source 'S3crets Scanner' scanner allows researchers and red-teamers to search for 'secrets' mistakenly stored in publicly exposed or company's…
Many enterprises continue to leave cloud storage buckets exposed despite widely available documentation on how to properly secure them.
From the basics to advanced techniques, here's what you should know.
New open source Cloud Hunter tool, developed through Lacework Labs research, helps customers get better visibility to reduce response times…
Toyota Motor Corporation is warning that customers' personal information may have been exposed after an access key was publicly available…