In a recent cyber incident, Mukesh, the CTO of Razz Security, exploited a significant security vulnerability to gain full server access through Continuous Integration/Continuous Deployment (CI/CD) pipelines. CI/CD pipelines streamline the process of delivering code by automating continuous
A significant security breach has revealed vulnerabilities even within firms dedicated to cybersecurity. In July 2024, KnowBe4, a well-known Florida-based IT security company, found itself compromised by a North Korean hacker posing as a legitimate tech employee. This breach, facilitated by
Balancing cybersecurity and user experience online is crucial, yet challenging, especially as cyber threats become increasingly sophisticated and widespread, forcing platforms to reinforce their defenses continually. Ensuring strong cybersecurity measures often involves implementing stringent
In a concerning development, cybersecurity researchers at Palo Alto Networks have discovered a new malware campaign that targets users attempting to download GlobalProtect VPN software. This campaign employs a technique known as SEO poisoning to manipulate search engine results, thereby making
As organizations increasingly recognize the critical role of application security, strategies to ensure the integrity of their software supply chains have become paramount. The 2024 State of Code Security survey, commissioned by OpenText and conducted by Dark Reading, underscores this shift towards
Fortinet's recent announcement regarding the enhancement of its unified Secure Access Service Edge (SASE) platform marks a significant milestone in cybersecurity. By integrating new sovereign SASE capabilities and generative AI (GenAI) features, Fortinet aims to deliver a comprehensive and