Cyber Risk

How Did a Phishing Attack Compromise 18 npm Packages?
Security Operations & Management How Did a Phishing Attack Compromise 18 npm Packages?

Imagine a single deceptive email slipping through the cracks, compromising 18 widely-used software packages and threatening billions of downloads, a scenario that became reality in a recent cybersecurity breach within the npm ecosystem, a cornerstone of modern software development. On September 8,

Sitecore Zero-Day Vulnerability – Review
Security Operations & Management Sitecore Zero-Day Vulnerability – Review

Unveiling a Critical Threat in Digital Experience Platforms Imagine a scenario where a seemingly innocuous configuration detail in a widely used content management system becomes the gateway for malicious actors to seize control of entire digital ecosystems. This is the reality faced by

Cloudflare Defends Against Record 11.5 Tbps DDoS Attack
Security Operations & Management Cloudflare Defends Against Record 11.5 Tbps DDoS Attack

In an era where digital infrastructure serves as the backbone of global connectivity, the sheer scale of cyber threats continues to escalate at an alarming pace, with distributed denial-of-service (DDoS) attacks reaching unprecedented levels of intensity, posing severe risks to online stability.

Why Is Tesco Suing Broadcom Over VMware License Changes?
Security Operations & Management Why Is Tesco Suing Broadcom Over VMware License Changes?

Imagine a major retailer, responsible for feeding millions across the UK and Ireland, suddenly facing a tech crisis that could halt its operations. This is the reality for Tesco, embroiled in a high-stakes legal battle with Broadcom over VMware licensing changes. With a claim for at least $134

California Privacy Law Fails: Data Brokers Ignore Requests
Security Operations & Management California Privacy Law Fails: Data Brokers Ignore Requests

In an age where personal data is often treated as currency, the California Consumer Privacy Act (CCPA), enacted several years ago, emerged as a beacon of hope for consumer protection across the United States. Designed to empower individuals with control over their personal information, this

JSON File Leaks Expose Azure AD Credentials, Pose Risks
Security Operations & Management JSON File Leaks Expose Azure AD Credentials, Pose Risks

What happens when a seemingly harmless file becomes the skeleton key to an organization’s entire cloud infrastructure, exposing critical vulnerabilities in the process? In an era where digital assets are as valuable as physical ones, a single misstep in securing configuration files can unleash

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later