Wazuh in the Cloud Era: Navigating the Challenges of Cybersecurity

Cloud computing has innovated how organizations operate and manage IT operations, such as data storage, application deployment, networking, and overall resource management. The cloud offers scalability, adaptability, and accessibility, enabling businesses to achieve sustainable growth. However, adopting cloud technologies into your infrastructure presents various cybersecurity risks and

The Hacker News – ​Read More

Warning: New Ivanti Auth Bypass Flaw Affects Connect Secure and ZTA Gateways

Ivanti has alerted customers of yet another high-severity security flaw in its Connect Secure, Policy Secure, and ZTA gateway devices that could allow attackers to bypass authentication.
The issue, tracked as CVE-2024-22024, is rated 8.3 out of 10 on the CVSS scoring system.
“An XML external entity or XXE vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x), Ivanti

The Hacker News – ​Read More

CodeSignal targets skills gap with ‘Learn’ platform amidst tech talent crunch

CodeSignal Learn is a new platform that offers practice-based, mastery-oriented learning experiences for tech skills, powered by CodeSignal’s skill assessment engine.Read More

Security News | VentureBeat – ​Read More

Stealthy Zardoor Backdoor Targets Saudi Islamic Charity Organizations

An unnamed Islamic non-profit organization in Saudi Arabia has been targeted as part of a stealthy cyber espionage campaign designed to drop a previously undocumented backdoor called Zardoor.
Cisco Talos, which discovered the activity in May 2023, said the campaign has likely persisted since at least March 2021, adding it has identified only one compromised target to date, although it’s

The Hacker News – ​Read More

Fortinet Warns of Critical FortiOS SSL VPN Flaw Likely Under Active Exploitation

Fortinet has disclosed a new critical security flaw in FortiOS SSL VPN that it said is likely being exploited in the wild.
The vulnerability, CVE-2024-21762 (CVSS score: 9.6), allows for the execution of arbitrary code and commands.
“A out-of-bounds write vulnerability [CWE-787] in FortiOS may allow a remote unauthenticated attacker to execute arbitrary code or command via specially

The Hacker News – ​Read More

The Linux Foundation and its partners are working on cryptography for the post-quantum world

Quantum computing is very much a mixed blessing.

Latest stories for ZDNET in Security – ​Read More

QR Code ‘Quishing’ Attacks on Execs Surge, Evading Email Security

The use of QR codes to deliver malicious payloads jumped in Q4 2023, especially against executives, who saw 42 times more QR code phishing than the average employee.

darkreading – ​Read More

Why Demand for Tabletop Exercises Is Growing

Tabletop exercises can be an effective and affordable way to test an organization’s defense and response capabilities against cyberattack.

darkreading – ​Read More