Yearly Archives: 2025
Argentinian airport security payroll system reportedly breached
Infiltration of the hospital's network earlier that month resulted in the compromise of files, one of which had individuals' names, bir...
Massive T-Mobile breach prompts lawsuit from Washington state
Infiltration of the hospital's network earlier that month resulted in the compromise of files, one of which had individuals' names, bir...
Thomson Reuters acquires SafeSend for $600M
Global media and technology services provider Thomson Reuters Corporation has paid $600 million in cash to acquire Michigan-based tax a...
Alibaba Cloud introduces advanced security features for hybrid, multi-cloud
Alibaba Cloud has launched enhanced security features to address the increasing complexity of managing hybrid and multi-cloud environme...
Cloud security challenges arise for data engineers
As data becomes a critical asset for businesses, data engineers play a pivotal role in ensuring its secure management, particularly wit...
Cloud, AI, and cybersecurity converge on fintech landscape
The intersection of cloud computing, artificial intelligence, and cybersecurity is transforming financial services, driving innovations...
Key trends for Kubernetes security in 2024
Kubernetes security encompasses protective measures to safeguard applications within Kubernetes environments, and with Kubernetes adopt...
Four million locations in sight for fiber builder Brightspeed
Press Release
Brightspeed, one of the nation’s largest fiber broadband builders focused on empowering more homes with ultrafast, reliab...
Removing Rust, Double Clickjacking, h3i CLI, JWT Mistakes, Reviewing Recursion – ASW #312
To emphasize from the start, many of these vulns "...result in little or no real-world harm in most contexts."
However, there's still ...
Four ways to mitigate the abuse of generic top-level domains
COMMENTARY: Domain mirroring, or a domain impersonation attack, remains one of the oldest tricks in the phishing playbook. It’s when th...