Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Just-In-Time (JIT) Access Management: The Essential Guide

Standing privileges are a ticking time bomb in your cloud environment—and the threat might be closer than you think. Every user with continuous access represents a potential vulnerability, and the financial, reputational, and legal reputations can be severe. Stolen credentials were among the top three reasons hackers gain access to organizations’ systems.

Warning: Ransomware Threats Increased Fourfold in 2024

Researchers at Barracuda observed a fourfold increase in ransomware threats last year, driven by increasingly sophisticated ransomware-as-a-service (RaaS) operations. “The developers behind RaaS platforms often have the time, resources, and skills to invest heavily in advanced and evasive toolsets and templates,” Barracuda explains.

Software Will Become Agentic and the Security Lessons We Need To Learn

Ever since OpenAI publicly released ChatGPT in late 2022, people have been predicting the end of programmers. Supposedly, AI can do anything programmers can do. While I’m not convinced all programmers are going away, I wouldn’t want to be a brand new programmer, and I do think the field is definitely going to change, if not significantly shrink over time. I’m not going out on much of a limb in saying this as almost everyone thinks this. Microsoft CEO Satya Nadella thinks this.

Invoice or Impersonation? 36.5% Spike in Phishing Attacks Leveraging QuickBooks' Legitimate Domain in 2025

A KnowBe4 Threat Lab Publication Authors: Martin Kraemer, James Dyer, and Lucy Gee Much like sending a phishing email from a compromised account, cybercriminals can boost the deliverability and credibility of their attacks by leveraging legitimate platforms. Notably, there has been a growing proportion sent using the popular accounting software Intuit QuickBooks. Our Threat Research team has observed a 36.5% increase in the use of this platform since January 1, 2025.

AI-automated Fuzzing Found a Dynamic Stack Buffer Overflow in abseil-cpp

A dynamic stack buffer overflow vulnerability in the Abseil C++ library (abseil-cpp) was autonomously identified through AI-enhanced fuzz testing using CI Fuzz’s AI Test Agent and has been fully addressed with a patch. This post dives into the vulnerability, its discovery, and its implications for systems relying on this widely-used library.

How do misconfigurations affect your customers' security?

Incorrect configurations in digital systems represent a growing security threat, as even minor errors can help set up cyberattacks. These vulnerabilities arise when system, application, or network settings fail to follow security best practices, such as outdated default settings or failures in Cloud services, databases, or firewalls. These can expose your customers to serious risks, such as unauthorized access or theft of sensitive information.

Credential Coercion Vulnerabilities in Ivanti Endpoint Manager

Multiple vulnerabilities have been discovered in Ivanti Endpoint Manager, affecting various file hashing functions. These vulnerabilities—CVE-2024-10811, CVE-2024-13161, CVE-2024-13160, and CVE-2024-13159—allow credential coercion, which can lead to path traversal and potentially enable remote code execution (RCE).

Vulnerability Scanning and How It Works in Cyber Security?

Vulnerability scanning refers to the process of evaluating applications, APIs they consume, systems, networks, and cloud environments to identify and pinpoint vulnerabilities within your organization’s digital infrastructure. It involves using automated tools trained to scan for known CVEs, misconfigurations, and potential attack vectors. Vulnerability scanning today is more than just ticking checkboxes.

Reasons to Switch to Cloud-Based Video Surveillance

Keeping your property secure is more important than ever, and traditional surveillance systems may not provide the flexibility and protection you need. Cloud-based video surveillance offers a modern alternative that allows users to monitor their homes or businesses from anywhere. Companies like Stratus Infosystems provide solutions that enhance security with remote access and AI-powered tools. Unlike older systems that rely on physical storage, cloud solutions offer greater accessibility, security, and convenience. Here are five reasons why making the switch is a smart move.