Security News

Veeam Software releases new cloud data management capabilities as part of Veeam Availability Suite 9.5 update 4, as well as the upcoming Veeam Availability for AWS and Veeam Availability Console...

More than 70% of tech professionals said security spending has increased in the past year, according to a Ping Identity report.

Dev fears sub-domain abuse – Plus, unofficial patches for trio of Windows zero-days Microsoft has been accused of ignoring an IT security risk that could be exploited to create legit-looking...

HID Global launched its HID Origo cloud platform that opens opportunities for partners to create workplace experiences that are built on HID’s access control infrastructure. The platform combines...

One malicious tactic that has become quite prevalent in recent years is known as a ‘man in the cloud’ (MitC) attack. This attack aims to access victims’ accounts without the need to obtain...

Recent samples of the destructive Xbash Linux malware can uninstall cloud security protection products from infected servers, Palo Alto Networks reports. read more

Cloud infrastructures are a growing target for threat actors looking to mine cryptocurrency, as their vast computational power allows them to multiply the mining malware’s effect. Keeping its...

While security strategies should address privileged access and the risk of unsecured secrets and credentials, they should also closely align with DevOps culture and methods to avoid negatively...

Refined malware payloads from Chinese threat actor Rocke Group are sidestepping security tools to install cryptocurrency miners on cloud systems.

New samples of cryptomining malware performs a never-before-seen function: uninstalling cloud security products.