Kubernetes attack surface explodes: number of threats quadruples
Kubernetes is the industry standard for cloud-native workloads. Its ubiquity invites cyberattackers to exploi...
Kubernetes is the industry standard for cloud-native workloads. Its ubiquity invites cyberattackers to exploi...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Aikido Security is launching Aikido Endpoint, a lightweight agent designed to protect developers’ endpoints...
Kubernetes is the industry standard for cloud-native workloads. Its ubiquity invites cyberattackers to exploi...
A report from Dark Web Informer has raised questions about a possible data breach at Bol.com. On the platform...
Vercel has announced that attackers gained access to internal systems. The attack began at Context.ai, an AI ...
The number of vulnerabilities is becoming unmanageable. The U.S. security authority NIST is therefore updatin...
Three popular AI agents on GitHub Actions are vulnerable to so-called "Comment and Control" attacks. These ar...
Those who build in security only after the fact pay up to fifteen times the original cost. That’s why a str...
Anthropic has announced the AI model Mythos for automatically detecting vulnerabilities and building complete...
With the introduction of GPT-5.4-Cyber, OpenAI is taking the next step in the use of generative AI for cybers...