Azure Data Factory Bugs Expose Cloud Infrastructure
Three vulnerabilities in the service's Apache Airflow integration could have allowed attackers to take shadow administrative control over an enterprise cloud infrastructure, gain access to and exfiltrate data, and deploy malware.
To Defeat Cybercriminals, Understand How They Think
Getting inside the mind of a threat actor can help security pros understand how they operate and what they're looking for — in essence, what makes a soft target.
What you need to know to unlock the most critical security metrics
Frederico Hakamine, Technology Evangelist at Axonius, discusses the importance of developing effective cybersecurity metrics to align security efforts with business outcomes and drive meaningful conversations with stakeholders.
Wald.ai Launches Data Loss Protection for AI Platforms
The cybersecurity startup's data loss protection platform uses contextual redaction to help organizations safely use private business information across AI platforms.
Google, Amnesty International uncover new surveillance malware
Cellebrite is one of a number of developers that develop mobile device exploit and surveillance tools marketed as "forensics" software for law enforcement agencies investigating crimes.
Identity Crisis: Cybercriminals Are Exploiting Trust Faster Than You Can Defend It
Cybercriminals exploit legacy tools, cloud complexities, and automated platforms to weaponize identity management systems, transforming trust into the ultimate vulnerability.