Over a dozen firms compromised in BeyondTrust breach
After leveraging a zero-day within a third-party app to compromise a BeyondTrust AWS account asset, attackers proceeded to exploit the asset to secure an infrastructure API key that was then utilized to control another AWS account for managing Remote...
Proactive Vulnerability Management for Engineering Success
By integrating security into CI/CD, applying automated policies, and supporting developers with the right processes and tools, infosec teams can increase efficiency and build secure software.
AI Cyber Threat Intelligence Roundup: January 2025
AI threat research is a fundamental part of Cisco’s approach to AI security. Our roundups highlight new findings from both original and third-party sources.
Revolutionizing Cybersecurity: Insights from Kevin Brew at RCSI
Celebrating Cybersecurity Awareness Month in October reminded us of the importance of continuous learning and staying updated with the latest security practices. As we move forward, it’s essential to continue emphasizing the importance of...