Infrastructure & Network Security

Can Socket Revolutionize Open Source Security with AI and Real-Time Detection?
Infrastructure & Network Security Can Socket Revolutionize Open Source Security with AI and Real-Time Detection?

Open source software has become indispensable in modern software development, but with its rise, so have security concerns, especially supply chain attacks. Traditional Software Composition Analysis (SCA) tools often can't keep up, leading to growing demand for solutions like Socket. Recently,

Docker API Exploited in gRPC Attack to Deploy SRBMiner for Cryptocurrency
Infrastructure & Network Security Docker API Exploited in gRPC Attack to Deploy SRBMiner for Cryptocurrency

A recent study by Trend Micro has uncovered a sophisticated cyber attack targeting Docker remote API servers, where malicious actors employed the gRPC protocol over ##c to deploy the SRBMiner cryptominer. This attack underscores the vulnerabilities inherent in container environments and the

How to Manage macOS Security Settings for Apps and Developer Tools
Infrastructure & Network Security How to Manage macOS Security Settings for Apps and Developer Tools

macOS Sequoia is equipped with a variety of security settings designed to protect users from potentially harmful software and unauthorized system modifications. Even though macOS is considered one of the most secure operating systems worldwide, it still offers options to tweak settings for users

How Will New Cyber Security Laws Impact Organizations?
Infrastructure & Network Security How Will New Cyber Security Laws Impact Organizations?

The recent release of a cyber security legislative package by the Commonwealth government marks a pivotal shift in how organizations in Australia approach digital security. Comprised of the Cyber Security Bill 2024 and amendments to the Intelligence Services Act 2001 and the Security of Critical

Are Industrial Process Sensors Secure Against Cyber Threats?
Infrastructure & Network Security Are Industrial Process Sensors Secure Against Cyber Threats?

In the realm of industrial operations, cybersecurity has become an increasingly critical focus, particularly within the Oil & Natural Gas industry. Process sensors, which play a vital role in monitoring and controlling industrial environments, are often overlooked in cybersecurity strategies. This

Styra Patches NTLM Hash Leak Vulnerability in Open Policy Agent
Infrastructure & Network Security Styra Patches NTLM Hash Leak Vulnerability in Open Policy Agent

In recent developments, Styra has patched a crucial security flaw identified in its Open Policy Agent (OPA) that could have allowed remote attackers to compromise NTLM credentials. Discovered by cybersecurity researchers and designated CVE-2024-8260, this vulnerability necessitated immediate

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later