Fortinet warns of new critical FortiManager flaw used in zero-day attacks
Fortinet publicly disclosed today a critical FortiManager API vulnerability, tracked as CVE-2024-47575, that was exploited in zero-day attacks to steal...
Hackers exploit 52 zero-days on the first day of Pwn2Own Ireland
On the first day of Pwn2Own Ireland, participants demonstrated 52 zero-day vulnerabilities across a range of devices, earning a...
Permiso State of Identity Security 2024: A Shake-up in Identity Security Is Looming Large
Identity security is front, and center given all the recent breaches that include Microsoft, Okta, Cloudflare and Snowflake...
Optimizing the CV Pipeline in Automotive Vehicle Development Using the PVA Engine
In the field of automotive vehicle software development, more large-scale AI models are being integrated into autonomous vehicles....
Training a million models per day to save customers of all sizes from DDoS attacks
Our always-on DDoS protection runs inside every server across our global network. It constantly analyzes incoming traffic, looking...
4.2 Tbps of bad packets and a whole lot more: Cloudflare’s Q3 DDoS report
Welcome to the 19th edition of the Cloudflare DDoS Threat Report. Released quarterly, these reports provide an in-depth...
Introducing Access for Infrastructure: SSH
BastionZero joined Cloudflare in May 2024. We are thrilled to announce Access for Infrastructure as BastionZero’s native integration...
CISA Warns of Active Exploitation of Microsoft SharePoint Vulnerability (CVE-2024-38094)
A high-severity flaw impacting Microsoft SharePoint has been added to the Known Exploited Vulnerabilities (KEV) catalog by the...
The Global Surveillance Free-for-All in Mobile Ad Data
Not long ago, the ability to digitally track someone’s daily movements just by knowing their home address, employer,...
The Crypto Game of Lazarus APT: Investors vs. Zero-days
Introduction Lazarus APT and its BlueNoroff subgroup are a highly sophisticated and multifaceted Korean-speaking threat actor. We closely...
Researchers Reveal ‘Deceptive Delight’ Method to Jailbreak AI Models
Cybersecurity researchers have shed light on a new adversarial technique that could be used to jailbreak large language...
Think You’re Secure? 49% of Enterprises Underestimate SaaS Risks
It may come as a surprise to learn that 34% of security practitioners are in the dark about...
Ransomware Gangs Use LockBit’s Fame to Intimidate Victims in Latest Attacks
Threat actors have been observed abusing Amazon S3 (Simple Storage Service) Transfer Acceleration feature as part of ransomware...
Boeing-made satellite breaks up in space
The “total loss” of the communications satellite has affected Intelsat customers around the world. Source:: BBC News –...
Will AI make work burnout worse?
As more AI tools are rolled out, some argue they are contributing to employee burnout. Source:: BBC News...
CISA proposes new security requirements to protect govt, personal data
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) is proposing security requirements to prevent adversary states from accessing...
AWS Mainframe Modernization introduces new integrations for managed runtimes
We are excited to announce that the AWS Mainframe Modernization service now offers new integrations that provide greater...
Windows 10 KB5045594 update fixes multi-function printer bugs
Microsoft has released the optional KB5045594 preview cumulative update for Windows 10 22H2 with fixes for problems printing...
AWS, Azure auth keys found in Android and iOS apps used by millions
Multiple popular mobile applications for iOS and Android come with hardcoded, unencrypted credentials for cloud services like Amazon Web...
New middleware doubles GPU computational efficiency for AI workloads in trials, says Fujitsu
New middleware from Fujitsu has achieved more than a 2x increase in GPU computational efficiency for artificial intelligence...