Category: EN

New Salt Typhoon Attacks Leverage Zero-Days and DLL Sideloading

Salt Typhoon represents one of the most persistent and sophisticated cyber threats targeting global critical infrastructure today. Believed to be linked to state-sponsored actors from the People’s Republic of China, this advanced persistent threat group has executed a series of…

OpenFGA: The open-source engine redefining access control

OpenFGA is an open-source, high-performance, and flexible authorization engine inspired by Google’s Zanzibar system for relationship-based access control. It helps developers model and enforce fine-grained access control in their applications. At its core, OpenFGA enables teams to define who can…

Hackers Exploit OAuth Apps to Keep Cloud Access Even After Password Resets

Cloud account takeover attacks have evolved beyond simple credential theft. Cybercriminals are now exploiting OAuth applications to maintain persistent access to compromised environments, bypassing traditional security measures like password resets and multifactor authentication. Cloud account takeover (ATO) attacks have become…

3 DevOps security pitfalls and how to stay ahead of them

In this Help Net Security video, Dustin Kirkland, SVP of Engineering at Chainguard, explores three of the most pressing DevOps security issues engineers encounter: unpatched code, legacy systems, and the rise of AI and automation. He explains how each one…

How Adaptable is Your Secrets Security Strategy?

Are You Safeguarding Non-Human Identities Effectively in Your Cloud Environment? Enterprises often ask whether their secrets security strategy is truly adaptable. Traditionally, cybersecurity has revolved around human identities, but the rise of digital transformation has cast a spotlight on Non-Human…