The Crumbling Castle
By Jaye Tillson, Director of Strategy, Axis Security In the realm of IT security, the traditional “castle and moat” strategy…
By Jaye Tillson, Director of Strategy, Axis Security In the realm of IT security, the traditional “castle and moat” strategy…
By Jeremy Butteriss, EGM Ecosystem and Partnerships, Xero An iconic moment in the rise of ecosystems was Steve Ballmer on…
Cyberattackers are targeting Apache webservers and websites using the popular Laravel Web application framework in order to steal credentials for…
CISA and the FBI warned today that threat actors using Androxgh0st malware are building a botnet focused on cloud credential…
What a recent rise in DDoS attacks portends — and how to prepare for 2024.
Loosening attitudes about cloud security are expected to create a nearly $10 billion public cloud market in the Middle East…
Today, CISA ordered U.S. federal agencies to secure their systems against an actively exploited vulnerability that lets attackers gain root…
Security and data analytics company Sumo Logic disclosed a security breach after discovering that its AWS (Amazon Web Services) account…
Admins need to patch immediately, as the prolific cybercrime group pivots from cryptomining to going after cloud secrets and credentials.
The operators of the Kinsing malware are targeting cloud environments with systems vulnerable to "Looney Tunables," a Linux security issue identified…