Unit 42 found that 63% of third-party code used in building cloud infrastructure contained insecure configurations.
Source: Read More (Latest topics for ZDNet in Security)
Unit 42 found that 63% of third-party code used in building cloud infrastructure contained insecure configurations.
Source: Read More (Latest topics for ZDNet in Security)
Connecticut’s recently passed data privacy bill became law on Wednesday, making it the fifth state in the U.S. with some form of data privacy protections for its residents. S.B. No. 6 – The ‘Act Concerning Personal Data Privacy and Online Monitoring’ – became law without the governor’s signature because the state has a rule that […]
Microsoft on Wednesday said it remediated a vulnerability in its Azure Container Instances (ACI) services that could have been exploited by a malicious actor “to access other customers’ information” in what the researcher described as the “first cross-account container takeover in the public cloud.” An attacker exploiting the weakness could execute malicious commands on other […]
Every hour, a threat actor starts a new scan on the public web for vulnerable systems, moving at a quicker pace than global enterprises when trying to identify serious vulnerabilities on their networks. […] Source: Read More (BleepingComputer)