Wing Disrupts the Market by Introducing Affordable SaaS Security
Today, mid-sized companies and their CISOs are struggling to handle the growing threat of SaaS security with limited manpower and…
Today, mid-sized companies and their CISOs are struggling to handle the growing threat of SaaS security with limited manpower and…
A new deceptive package hidden within the npm package registry has been uncovered deploying an open-source rootkit called r77, marking…
Microsoft has detailed a new campaign in which attackers unsuccessfully attempted to move laterally to a cloud environment through an…
A new Linux security vulnerability dubbed Looney Tunables has been discovered in the GNU C library's ld.so dynamic loader that,…
Chipmaker Qualcomm has released security updates to address 17 vulnerabilities in various components, while warning that three other zero-days have…
Cybersecurity researchers have disclosed multiple critical security flaws in the TorchServe tool for serving and scaling PyTorch models that could…
Nearly three dozen counterfeit packages have been discovered in the npm package repository that are designed to exfiltrate sensitive data…
APIs, also known as application programming interfaces, serve as the backbone of modern software applications, enabling seamless communication and data…
Security Configuration Assessment (SCA) is critical to an organization's cybersecurity strategy. SCA aims to discover vulnerabilities and misconfigurations that malicious…
Firewall and distributed denial-of-service (DDoS) attack prevention mechanisms in Cloudflare can be circumvented by exploiting gaps in cross-tenant security controls,…