Application Security
Is Microsoft Putting Their Customers on the Front Line of Cyber War?
The recent cyber-attack by China isn’t the first time Microsoft 365 has been breached. Microsoft’s insecure environment and “you’re on your own” attitude toward customers shows a willingness to put us all ...
APT Group Red Menshen is Rapidly Evolving its BPFDoor Malware
Red Menshen is an APT group that is rapidly evolving its BPFDoor backdoor malware that targets systems running Linux or Solaris ...
OPSEC FAIL: US Military Email Going to Mali — via Typo
MX Mixup: Russian-allied government can intercept “highly sensitive information”—because there’s no “I” in .ML ...
Security Teams Need to Address One of the Biggest Software Supply Chain Risks: Open Source
One of the biggest threats to software supply chain security is open source software applications and components. Many enterprises and small businesses have come to rely on open source solutions, and they ...
Addressing the Mobile Malware Threat With Zero-Trust
AI-enabled zero-trust solutions can help address the rising threat of mobile malware ...
Microsoft Entra Expands, Azure Active Directory is Now Entra ID
Microsoft revealed its Azure Active Directory (Azure AD) enterprise identity service will be rebranded Entra ID, a change that will occur by the end of the year ...
China Breaches Microsoft Cloud — Spied on US Govt. Email
Storm-0558 Brewing: Multiple Microsoft failures cause data leaks at State and Commerce depts., plus 23 other orgs ...
Why Developers Need a Security Mindset (And How to Help Them With It)
It’s never been a more important time for developers to have a security mindset. Software developers are increasingly relying on open source components in their products. While this makes their jobs somewhat ...
Answering Your Goldilocks Questions About How HPA and VPA Work Together
Kubernetes, the open source platform for managing containerized workloads, provides you with a framework for automating software deployment, scaling, and management. Let’s dig into the scaling part of that — K8s supports ...
Securing Third-Party APIs: What You Need to Know
API attacks are on the rise. Learn about the business risks and best practices to secure third-party APIs. The post Securing Third-Party APIs: What You Need to Know appeared first on Signal ...