Over 300 orgs compromised through several DrayTek exploits
Intrusions were initially conducted by the Monstrous Mantis operation, which exfiltrated DrayTek device credentials later shared with its partners Ruthless Mantis, also known as PTI-288, and LARVA-15, also known as Wazawaka, according to an analysis...
Azure Data Factory Bugs Expose Cloud Infrastructure
Three vulnerabilities in the service's Apache Airflow integration could have allowed attackers to take shadow administrative control over an enterprise cloud infrastructure, gain access to and exfiltrate data, and deploy malware.
Data Centers Delivering AI Outcomes: Act and Start Now
Cisco’s new Wi-Fi 7 solution delivers unmatched connectivity, robust security, and AI-native assurance—setting a new standard for the modern workplace.
To Defeat Cybercriminals, Understand How They Think
Getting inside the mind of a threat actor can help security pros understand how they operate and what they're looking for — in essence, what makes a soft target.
What you need to know to unlock the most critical security metrics
Frederico Hakamine, Technology Evangelist at Axonius, discusses the importance of developing effective cybersecurity metrics to align security efforts with business outcomes and drive meaningful conversations with stakeholders.
Wald.ai Launches Data Loss Protection for AI Platforms
The cybersecurity startup's data loss protection platform uses contextual redaction to help organizations safely use private business information across AI platforms.
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-55956 Cleo Multiple Products Unauthenticated File Upload Vulnerability These types of vulnerabilities are frequent...