Topic: access controls
-
Insider Threats, Malware & AI: The Rising File Security Crisis
File security breaches are escalating, causing significant financial losses, stolen data, and intellectual property exposure across organizations. Insider threats, weak access controls, and evolving malware like ransomware and zero-day threats are major vulnerabilities, with many companies lackin...
Read More » -
Master Zero Trust & Identity at Today's Virtual Summit
The SecurityWeek Zero Trust & Identity Strategies Summit 2025 is a virtual event focusing on modern cybersecurity frameworks and the evolution of Zero Trust into a core strategy for protecting corporate assets. Zero Trust Network Access (ZTNA) is highlighted as essential for strengthening access ...
Read More » -
American Archive of Public Broadcasting Patches Security Flaw
A security flaw in the American Archive of Public Broadcasting (AAPB) website allowed unauthorized downloads of protected media files for years, which was exploited since at least 2021 and has now been fixed. The vulnerability was an Insecure Direct Object Reference (IDOR) flaw that let users byp...
Read More » -
Cisco ASA Devices Face Surge in Network Scans
A significant surge in network scanning activity targeting Cisco ASA devices has been detected, with spikes in late August involving up to 25,000 unique IP addresses, suggesting potential vulnerability exploitation. The scanning was largely driven by a Brazilian botnet and focused heavily on the ...
Read More » -
AI's Success Hinges on Trusted, Well-Governed Data
Many businesses are struggling to implement AI effectively due to a lack of trusted, well-governed data, which is essential for reliable and secure outcomes. A significant challenge is the complexity and security risks associated with unstructured data, with many organizations citing budget const...
Read More » -
Discord Data Breach: Vendor Denies Being Hacked
5CA denies experiencing a data breach in its systems and clarifies it never handled government-issued IDs for the affected client, maintaining secure operations under strong data protection protocols. An ongoing forensic investigation, involving the client and cybersecurity experts, indicates the...
Read More » -
Bots Exposed: The Growing Threat of Data Leaks
Non-human identities (NHIs) like bots and automation scripts are now the fastest-growing security risk, leaking sensitive data more than human-related vulnerabilities. Machine identities outnumber human ones 144 to 1, with credentials often forgotten, overprivileged, or stored in risky locations ...
Read More » -
ClickFix Exploits MHSTA to Evade Security for Infostealers
ClickFix is a growing social engineering tactic that tricks users into executing harmful commands by pretending to fix system issues, often through deceptive pop-ups. ClickFix has driven a 10% increase in drive-by compromises and is now the second most common evasion technique, often exploiting t...
Read More »