A new wave of device code phishing shows how threat actors are scaling account compromise using AI and end‑to‑end automation.
Sergey Chubarov explained how unmanaged non-human identities such as service accounts, API keys and tokens can become a major attack vector and outlined practical steps to improve visibility, ...
Stop paying monthly fees for password security. Discover Vaultwarden, a powerful, open-source free password manager with no ...
This new Storm attack platform can exfiltrate passwords and session data, enabling 2FA bypass. Google Chrome, Microsoft Edge ...
Iran-linked attacks hit 300+ Israeli M365 orgs in March 2026, reviving ransomware campaigns and escalating regional cyber ...
Docker CVE-2026-34040 enables AuthZ bypass via padded requests, risking host compromise; fixed in version 29.3.1.
In this session, we’ll go beyond backup to explore what it really means to own and protect your data across Microsoft 365, Entra ID and Azure. You’ll learn how key decisions, including where data is ...
You're the sole stakeholder for any of your own shortcomings.
Christian Wenz explains why the Backends for Frontends (BFF) pattern is emerging as a more secure authentication model for single-page applications.
A CloudSEK report reveals that 22 Android apps with over 500 million installs expose hardcoded API keys that can access ...
Just because you have antivirus software installed on your PC doesn't mean a zero-day Trojan can't steal your personal data. The top encryption software keeps you safe from malware (and the NSA). When ...