Zluri addresses expanding identity attack surface across SaaS, cloud, and AI

Enterprise identity is undergoing a fundamental shift. Employees are no longer the only identities operating inside organizations. Service accounts, machine identities, application integrations, and AI agents now interact with enterprise systems at sca… Continue reading Zluri addresses expanding identity attack surface across SaaS, cloud, and AI

Russian hackers go after high-value targets through Signal

Russian intelligence-linked hackers are targeting commercial messaging platforms, with Signal a primary focus, the FBI and CISA warn. The campaign is aimed at individuals of intelligence interest, including government personnel, journalists, and others… Continue reading Russian hackers go after high-value targets through Signal

Zero Networks Kubernetes Access Matrix exposes hidden access paths and blast radius

Zero Networks has announced the Kubernetes Access Matrix, a real time visual map that exposes every allowed and denied rule inside Kubernetes clusters. The new capability enables security and DevOps teams to see, understand, and control Kubernetes acce… Continue reading Zero Networks Kubernetes Access Matrix exposes hidden access paths and blast radius

Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper

Cybersecurity researchers have uncovered malicious artifacts distributed via Docker Hub following the Trivy supply chain attack, highlighting the widening blast radius across developer environments.
The last known clean release of Trivy on Docker Hub i… Continue reading Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper

Posted in Uncategorized