Category: EN

Korean Telco Giant SK Telecom Hacked

SK Telecom, South Korea’s largest telecom company, disclosed a data leak involving a malware infection. The post Korean Telco Giant SK Telecom Hacked appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Korean Telco…

CISA Issues Five ICS Advisories Highlighting Critical Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released five urgent advisories on April 22, 2025, targeting critical vulnerabilities in widely-used Industrial Control Systems (ICS) from Siemens, ABB, and Schneider Electric. With the increasing frequency and severity of cyberattacks…

Cloud-Native Security: Assurance for Tech Leaders

Why Should Tech Leaders Place Their Trust in Cloud-Native Security? Let’s ask another question: What better assurance for tech leaders than a robust system that offers comprehensive end-to-end protection? This is precisely what cloud-native security does, and why it is…

Driving Innovation through Secure NHI Lifecycle Management

How Can Secure NHI Lifecycle Management Drive Innovation? Do we ever ponder the security of our machine identities? This question becomes increasingly pertinent as more organizations rely on cloud-based platforms for their operations. These are often a fertile playground for…

Secrets Management Solutions That Fit Your Budget

How Can Budget-Friendly Secrets Management Boost Your Cybersecurity Strategy? Navigating vast of cybersecurity can often seem like attempting to solve an intricate puzzle. One key piece that often gets overlooked is the management of Non-Human Identities (NHIs) and their associated…

Travel Sector: Stay Confident with NHI Management

Is Your Travel Sector Business Harnessing the Power of NHI Management? Every industry faces its unique set of challenges when it comes to guaranteeing cybersecurity. However, the travel sector, with its immense data volumes and complex, interconnected frameworks, is at…

Mark & Spencer hit by Cyber Attack on Easter

On April 21, 2025, British retail giant Mark and Spencer (M&S) confirmed that it was the victim of a cyberattack that disrupted its contactless payment terminals in over 1,400 of its UK stores. The company reassured customers that both its…

The Tech That Safeguards the Conclave’s Secrecy

Following the death of Pope Francis, the Vatican is preparing to organize a new conclave in less than 20 days. This is how they’ll tamp down on leaks. This article has been indexed from Security Latest Read the original article:…

ChatGPT Creates Working Exploit for CVEs Before Public PoCs Released

In a development that could transform vulnerability research, security researcher Matt Keeley demonstrated how artificial intelligence can now create working exploits for critical vulnerabilities before public proof-of-concept (PoC) exploits are available. Keeley used GPT-4 to develop a functional exploit for…

New Cookie-Bite Attack Let Hackers Bypass MFA & Maintain Access to Cloud Servers

A sophisticated attack technique dubbed “Cookie-Bite” enables cybercriminals to silently bypass multi-factor authentication (MFA) and maintain persistent access to cloud environments. Varonis Threat Labs revealed that attackers leverage stolen browser cookies to impersonate legitimate users without requiring credentials, effectively rendering…

Google Cloud Composer Vulnerability Let Attackers Elevate Their Privileges

A critical privilege-escalation vulnerability in Google Cloud Platform (GCP), dubbed “ConfusedComposer,” could have allowed attackers to gain elevated permissions to sensitive cloud resources.  The vulnerability, now patched, enabled attackers with minimal permissions to potentially gain control over a highly privileged…

Google Cloud Composer Flaw Allows Attackers to Gain Elevated Privileges

Research disclosed a now-patched high-severity vulnerability in Google Cloud Platform’s (GCP) Cloud Composer service, dubbed ConfusedComposer. It could have allowed attackers to hijack cloud workflows and gain control over critical resources. The flaw highlights risks in automated cloud service orchestration. What…