DevSecOps

Why Is Tesco Suing Broadcom Over VMware License Changes?
Security Operations & Management Why Is Tesco Suing Broadcom Over VMware License Changes?

Imagine a major retailer, responsible for feeding millions across the UK and Ireland, suddenly facing a tech crisis that could halt its operations. This is the reality for Tesco, embroiled in a high-stakes legal battle with Broadcom over VMware licensing changes. With a claim for at least $134

JSON File Leaks Expose Azure AD Credentials, Pose Risks
Security Operations & Management JSON File Leaks Expose Azure AD Credentials, Pose Risks

What happens when a seemingly harmless file becomes the skeleton key to an organization’s entire cloud infrastructure, exposing critical vulnerabilities in the process? In an era where digital assets are as valuable as physical ones, a single misstep in securing configuration files can unleash

First AI-Powered Ransomware Discovered, Not Yet Active
Security Operations & Management First AI-Powered Ransomware Discovered, Not Yet Active

What if the next cyberattack isn’t just a product of human ingenuity but a creation of artificial intelligence, capable of outsmarting even the most advanced defenses, leaving little room for reaction? Picture a malware that learns, adapts, and strikes with precision. This chilling possibility is

How Does ZipLine Attack Exploit Contact Us Forms for Cybercrime?
Security Operations & Management How Does ZipLine Attack Exploit Contact Us Forms for Cybercrime?

Imagine a seemingly harmless message arriving through a company's "Contact Us" form, initiating a conversation that appears legitimate, only to culminate in a devastating cyberattack that compromises sensitive data. This is the chilling reality of the ZipLine campaign, a sophisticated cybercrime

How Did AI Fuel the Nx NPM Supply Chain Attack?
Security Operations & Management How Did AI Fuel the Nx NPM Supply Chain Attack?

Imagine a digital ecosystem trusted by millions, including over 70 percent of Fortune 500 companies, suddenly becoming a gateway for a sophisticated cyberattack that shakes the foundation of software security. This scenario unfolded with Nx, a cornerstone of the NPM ecosystem, which faced a

What's New in Bun 1.2.21: Speed and Features Galore?
Security Operations & Management What's New in Bun 1.2.21: Speed and Features Galore?

Welcome to an insightful conversation about the latest developments in the JavaScript ecosystem! Today, we’re thrilled to chat with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. With his

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later