iOS 18.3.2 Patches Actively Exploited WebKit Vulnerability

iOS 18.3.2 Patches Actively Exploited WebKit Vulnerability

Apple has released iOS 18.3.2 and iPadOS 18.3.2 to fix a critical WebKit vulnerability that has been actively exploited by cybercriminals.  The flaw (CVE-2025-24201) allowed maliciously crafted web content to break out of the Web Content sandbox, posing a serious security risk. Initially believed to have been patched in iOS 17.2, Apple has now issued a supplementary fix to fully address the issue. The tech giant has also confirmed that this vulnerability was used in…

Read More

Cato Networks unveils next-gen firewall

Cato Networks unveils next-gen firewall

The Cato LAN NGFW requires no additional hardware and converges all firewalls from the internet, site-to-site, and within the LAN to simplify policy management and deliver consistent enforcement via a security engine. The centralized policy management eases the burden of configuring separate firewalls across locations because it allows everything to be managed from one console, according to Cato. The NGFW also enables enterprises to meet compliance requirements for localized traffic control and enforce security policies…

Read More

Trump Administration Shakes Up CISA with Staff and Funding Cuts

Trump Administration Shakes Up CISA with Staff and Funding Cuts

The US Cybersecurity and Infrastructure Agency (CISA) is undergoing significant changes under the new Trump Administration, with around 300 people’s contracts terminated and significant funding cuts for cybersecurity projects within the agency. On March 10, Christopher Chenoweth, Senior Pentester at CISA, announced on his LinkedIn account that the government contract he supported with CISA (DHS) was terminated in late February, Shortly after, another CISA red team contract was also terminated. “[Elon Musk’s] Department of Government Efficiency (DOGE)…

Read More

Supercharging your cybersecurity strategy with AI

Supercharging your cybersecurity strategy with AI

Artificial intelligence has been unleashed on the world. While its power is undeniable, its full potential to wreak havoc is still unknown. Cyber-criminals have few concerns about AI running amok, because chaos furthers their goals. While they launch AI-fueled lightning attacks, enterprises must tread carefully, aiming to respond to the multiplying threats without inadvertently creating new vulnerabilities that compound their risk. It has become clear that whether AI functions as a hero or villain depends…

Read More

Best Practices and Risks Considerations in Automation like LCNC and RPA

Best Practices and Risks Considerations in Automation like LCNC and RPA

Technologies such as Low-Code/No-Code (LCNC) and Robotic Process Automation (RPA) have become fundamental in the digital transformation of companies. They continue to evolve and redefine software development, providing new possibilities for different organizations. It allows users with no programming experience (citizen developers) to create applications and automate processes, simplifying complex tasks and optimizing business operations. Application platforms for these technologies offer intuitive visual interfaces. These allow anyone, from a business professional to an IT employee, to develop…

Read More

Machine Identities Outnumber Humans Increasing Risk Seven-Fold

Machine Identities Outnumber Humans Increasing Risk Seven-Fold

A surge in machine identities, faster threat detection and a significant drop in vulnerabilities are shaping the future of cloud security, according to a new report published by Sysdig today. Machine identities now outnumber human users by 40,000 to 1 and present 7.5 times more risk, according to the report. Managing these identities has become increasingly difficult as organizations expand their cloud operations. Meanwhile, the adoption of AI and machine learning (ML) has surged by…

Read More

API attacks surge due to rise in AI

API attacks surge due to rise in AI

According to a recent report by Kong, 25% of respondents have encountered AI-enhanced security threats related to APIs or LLMs, with 75% of respondents expressing serious concern about AI-enhanced attacks in the future. While 85% say they’re confident in their organization’s security capabilities, 55% of respondents cited they’ve experienced an API security incident in the past year, highlighting a notable disconnect.  While 92% of respondents say they are taking measures to counter AI-enhanced attacks and…

Read More

Chinese Hackers Implant Backdoor Malware on Juniper Routers

Chinese Hackers Implant Backdoor Malware on Juniper Routers

Chinese nation-state espionage actors have deployed backdoor malware on Juniper Networks’ Junos operating system (OS) routers, a new analysis by Mandiant has revealed. Impacted organizations have been urged to upgrade their Juniper devices to the latest images released by the firm, which includes mitigations and updated signatures. The affected Juniper routers were running end-of-life hardware and software. Juniper Networks Junos OS is a proprietary OS that powers most Juniper routing, switching and security devices. It…

Read More

At long last, OpenStack (now known as OpenInfra Foundation) joins Linux Foundation

At long last, OpenStack (now known as OpenInfra Foundation) joins Linux Foundation

“Open source has changed a lot, and what a project needs out of a foundation in 2025 is quite different from what a project needed in 2010 or 2012 when we were starting the OpenStack foundation,” Bryce said. “Governments are very interested in open source, and we have to make sure that we are participating in the right way to understand and comply with policies.” The Linux Foundation has had multiple efforts in recent years…

Read More

The Intersection of Digital Credit Solutions and Cybersecurity: Protecting Consumer Data in the Automotive Finance Industry

The Intersection of Digital Credit Solutions and Cybersecurity: Protecting Consumer Data in the Automotive Finance Industry

Digital credit solutions deliver convenience, speed, and flexibility. Along with its benefits, however, comes risk. Protecting consumer data has always been a priority for dealerships. It’s now a more complex initiative as cyberattacks in the industry increase due to more sophisticated hackers. Automotive finance stands at a crucial point. You want to increase your lead-to-sales ratio, reduce friction in the process, adhere to the FTC (Federal Trade Commission) Safeguards Rule, and apply the best cyber protections….

Read More
1 168 169 170 171 172 3,973