by Beck Bailey | Jun 19, 2025 | RSS
Find out the best practices for securely deploying applications and managing data in the cloud.
by Beck Bailey | Jun 19, 2025 | RSS
Most cyberattacks today don’t start with loud alarms or broken firewalls. They start quietly—inside tools and websites your business already trusts. It’s called “Living Off Trusted Sites” (LOTS)—and it’s the new favorite strategy of modern attackers. Instead of...
by Beck Bailey | Jun 19, 2025 | RSS
Threat actors with suspected ties to Russia have been observed taking advantage of a Google account feature called application specific passwords (or app passwords) as part of a novel social engineering tactic designed to gain access to victims’ emails. Details...
by Beck Bailey | Jun 19, 2025 | RSS
Meta Platforms on Wednesday announced that it’s adding support for passkeys, the next-generation password standard, on Facebook. “Passkeys are a new way to verify your identity and login to your account that’s easier and more secure than traditional...
by Beck Bailey | Jun 18, 2025 | RSS
Cybersecurity researchers have uncovered two local privilege escalation (LPE) flaws that could be exploited to gain root privileges on machines running major Linux distributions. The vulnerabilities, discovered by Qualys, are listed below – CVE-2025-6018 –...
Recent Comments