Ricerca
- Threat actors are actively looking for exposed .env files. These files have become ticking bombs deeply rooted inside DevOps practices. Our research paper uncovers the hidden dangers in DevOps using real-world examples.Digital Assistants (DA) are AI-driven software, sometimes embedded into dedicated hardware and integrated with multiple systems, that understand natural language and use them to perform various tasksHow can misconfigurations help threat actors abuse AI to launch hard-to-detect attacks with massive impact? We reveal how AI models stored in exposed container registries could be tampered with— and how organizations can protect their systems.Blockchain technology continues to be widely adopted by enterprises for its numerous benefits, and it has inevitably attracted the attention of malicious actors. The secure, decentralized nature of blockchain does present a challenge to cybercriminals, yet it is not immune to attacks.Enterprises have been steadily adopting private blockchains, placing this technology in different areas of their operations. When deployed as private permissioned networks, Ethereum-based blockchains and other similar decentralized ledger technologies are beneficial for enterprises. The advantages of integrating private blockchains into organizational processes can be substantial and multifaceted.Red teaming tools, which organizations use in cyberattack simulations and security assessments, have become an important cybersecurity component for those looking to strengthen organizational defenses.Our report dives into the evolution and security of blockchains and how enterprises are increasingly adopting this technology in the forms of private and hybrid blockchains.Our research highlights the problems faced by organizations with regard to API vulnerabilities and offers actionable solutions and practical steps to secure API systems.