Security News > 2025 > April

Google Fixed Cloud Run Vulnerability Allowing Unauthorized Image Access via IAM Misuse
2025-04-02 13:48

Cybersecurity researchers have disclosed details of a now-patched privilege escalation vulnerability in Google Cloud Platform (GCP) Cloud Run that could have allowed a malicious actor to access...

Cisco warns of CSLU backdoor admin account used in attacks
2025-04-02 13:19

Cisco warns admins to patch a critical Cisco Smart Licensing Utility (CSLU) vulnerability, which exposes a built-in backdoor admin account now used in attacks. [...]

How to map and manage your cyber attack surface with EASM
2025-04-02 13:00

In today’s digital landscape, understanding your organization’s attack surface is crucial for maintaining robust cybersecurity. To effectively manage and mitigate the cyber-risks hiding in modern...

KeePass Review (2025): Features, Pricing, and Security
2025-04-02 13:00

While its downloadable plugins make it highly customizable, KeePass’ unintuitive interface holds it back from one of our top password manager picks.

Google is making sending end-to-end encrypted emails easy
2025-04-02 11:51

Sending end-to-end encrypted (E2EE) emails from Gmail enterprise accounts is about to become much easier than it is now, Google has announced on Tuesday. The company will first make available this...

For healthcare orgs, DR means making sure docs can save lives during ransomware infections
2025-04-02 11:36

Organizational, technological resilience combined defeat the disease that is cybercrime When IT disasters strike, it can become a matter of life and death for healthcare organizations – and...

Helping Your Clients Achieve NIST Compliance: A Step by Step Guide for Service Providers
2025-04-02 11:25

Introduction As the cybersecurity landscape evolves, service providers play an increasingly vital role in safeguarding sensitive data and maintaining compliance with industry regulations. The...

Rational Astrologies and Security
2025-04-02 11:04

John Kelsey and I wrote a short paper for the Rossfest Festschrift: “Rational Astrologies and Security“: There is another non-security way that designers can spend their security budget: on making...

Oracle faces Texas-sized lawsuit over alleged cloud snafu and radio silence
2025-04-02 10:54

Victims expect to spend considerable time and money over privacy incident, lawyers argue Specialist class action lawyers have launched proceedings against Oracle in Texas over two alleged data breaches.…

Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers
2025-04-02 10:43

Cybersecurity researchers have shed light on an "auto-propagating" cryptocurrency mining botnet called Outlaw (aka Dota) that's known for targeting SSH servers with weak credentials. "Outlaw is a...