Tag: EN

Can AI manage cloud security effectively?

How Can AI Revolutionize Cloud Security Management? How do organizations ensure that their cloud environments are not just secure but intelligently managed? The answer lies in understanding the potential of AI in cloud security. With machines become predominant players in…

What makes NHIs safe for my company?

How Secure Are Non-Human Identities in Your Company’s Digital Strategy? Have you ever considered who—or rather, what—is accessing your company’s data? While we often focus on human users in cybersecurity strategies, non-human identities (NHIs) play a pivotal role in security…

How powerful is agentic AI in detecting threats?

Is Agentic AI the Key to Revolutionizing Threat Detection in Cybersecurity? Where organizations increasingly migrate to cloud environments, the complexity of safeguarding data intensifies. Cybersecurity is no longer just about protecting networks from human attackers but also about managing machine…

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2026-20045 Cisco Unified Communications Products Code Injection Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors…

Zoom fixed critical Node Multimedia Routers flaw

Zoom addressed a critical security vulnerability, tracked as CVE-2026-22844, that could result in remote code execution. Cloud-based video conferencing and online collaboration platform Zoom released security updates to address multiple vulnerabilities, including command injection, tracked as CVE-2026-22844 (CVSS score of…

NDSS 2025 – Dissecting Payload-Based Transaction Phishing On Ethereum

Authors, Creators & Presenters: Zhuo Chen (Zhejiang University), Yufeng Hu (Zhejiang University), Bowen He (Zhejiang University), Dong Luo (Zhejiang University), Lei Wu (Zhejiang University), Yajin Zhou (Zhejiang University) PAPER Dissecting Payload-Based Transaction Phishing On Ethereum In recent years, a more…

What Happens When Spyware Hits a Phone and How to Stay Safe

  Although advanced spyware attacks do not affect most smartphone users, cybersecurity researchers stress that awareness is essential as these tools continue to spread globally. Even individuals who are not public figures are advised to remain cautious. In December, hundreds…