Tag: EN

How Image Resizing Could Expose AI Systems to Attacks

Security experts have identified a new kind of cyber attack that hides instructions inside ordinary pictures. These commands do not appear in the full image but become visible only when the photo is automatically resized by artificial intelligence (AI) systems.…

ReVault Flaws Expose Dell ControlVault3 Hardware to Persistent Attacks

  RevaUlt, a company marketing itself on advanced endpoint protection and next-generation SOC capabilities, recently suffered a severe security breach. The attackers penetrated its internal environment, exploiting vulnerabilities in the architecture used for their supposed secure SOC platform.  The compromise…

Exciting Developments in Cloud-Native Security

Why are Cybersecurity Professionals Excited About Cloud-Native Advancements? Is it possible that the future of cybersecurity lies in the cloud? The answer, increasingly, is a resounding yes. Cloud-native advancements have ignited a spark in the sector, particularly in Non-Human Identities…

Building Trust with Robust NHIs Management

Why is Holistic NHI Management Indispensable for Robust Systems? Amidst the complex labyrinth of cybersecurity management, have you ever considered the strategic importance of NHIs and their implications on building a robust system? Non-Human Identities (NHIs) and the management of…

Amazon blocks APT29 campaign targeting Microsoft device code authentication

Amazon stopped a Russia-linked APT29 watering hole attack that hijacked Microsoft device code authentication via compromised sites. Amazon announced that it had disrupted an opportunistic watering hole campaign orchestrated by the Russia-linked cyber espionage group APT29 (aka SVR group, Cozy Bear, Nobelium, BlueBravo, Midnight Blizzard,…

Top 10 Attack Surface Management Software Solutions In 2025

Attack Surface Management (ASM) is a proactive security discipline focused on continuously discovering, analyzing, and reducing an organization’s external-facing digital footprint. In 2025, with the proliferation of cloud services, remote work, and supply chain dependencies, an organization’s attack surface has…

BSidesSF 2025: Future-Proof Your Career: Evolving In The Age Of AI

Creators, Authors and Presenters: Jay Sarwate, Alok Tongaonkar, Prutha Parikh, Ketan Nilangekar Our deep appreciation to Security BSides – San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s…