The Australian Cyber Security Centre (ACSC) has released new guidelines to assist organizations in securing Content Management Systems (CMS). The guidelines include good mitigation advice in areas of patching, account management, hardening and monitoring to name a few.
Microsoft has introduced a new source code analyzer tool dubbed Microsoft Application Inspector. The tool is designed to "identify interesting features in source code" and can help enable developers understand software components your apps use.
Cloud security experts from Palo Alto Networks have warned about three critical misconfigurations that are most common in most organizations and have contributed to the majority of cloud attacks.
A serious vulnerability in runc open-source container management has been discovered and patched. runc is used by most of the underlying container engines and runtime, such as Docker, cri-o, containerd, and Kubernetes.
Multiple serious vulnerabilities have been discovered within FreeRTOS, a real-time operating system kernel used in large number of internet-connected devices.
Cybersecurity firm UpGuard has discovered an error in Amazon AWS bucket configuration that led to the exposure of internal GoDaddy infrastructure data.
Uber suffered a massive data breach in October 2016 and paid hackers $100,000 to keep quiet about it and delete the data. The breach resulted in the loss of sensitive…
Three misconfigured AWS S3 buckets exposed US military archives of an astounding size.
Insider threats can be malicious or inadvertant, but the consequences can lead to costly brand damage or significant financial losses to your company. Understanding the types of insider threats and corresponding risk indicators can help minimize impact and damage caused by such threats.