Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover
Oct 01, 2025Ravie LakshmananAI Security / Cloud Security A severe security flaw has been disclosed in the Red Hat OpenShift...
Oct 01, 2025Ravie LakshmananAI Security / Cloud Security A severe security flaw has been disclosed in the Red Hat OpenShift...
The Rising Stakes in Critical Infrastructure Security Cybersecurity has traditionally been framed as an IT issue, protecting desktops, databases, and...
Over the past few months, NIST has been revising and updating Foundational Activities for IoT Product Manufacturers (NIST IR 8259...
We’re proud to announce that Sophos has been named a Leader in the IDC MarketScape™: Worldwide Extended Detection and Response...
Threat actors have been observed using seemingly legitimate artificial intelligence (AI) tools and software to sneakily slip malware for future...
Sep 29, 2025Ravie LakshmananMCP Server / Vulnerability Cybersecurity researchers have discovered what has been described as the first-ever instance of...
Sep 26, 2025Ravie LakshmananMalware / Cryptocurrency A new campaign has been observed impersonating Ukrainian government agencies in phishing attacks to...
The Russian advanced persistent threat (APT) group known as COLDRIVER has been attributed to a fresh round of ClickFix-style attacks...
Security leaders know that perimeters have always been moving targets. We defended networks with firewalls, then endpoints with agents, then...
Suspected Chinese hackers for months have been quietly hacking their way into the networks and systems of organization in the...
If you’ve been in the trenches of enterprise risk and compliance for any length of time, you’ve heard the...
An Iran-nexus cyber espionage group known as UNC1549 has been attributed to a new campaign targeting European telecommunications companies, successfully...
The phishing-as-a-service (PhaaS) offering known as Lighthouse and Lucid has been linked to more than 17,500 phishing domains targeting 316...
First, this suggests development of the feature has either stopped completely or been moved to a different cadence (perhaps Apple...
Cybersecurity researchers have discovered a new malware loader codenamed CountLoader that has been put to use by Russian ransomware gangs...