Topic: excessive permissions

  • Identity: The Leading Cloud Security Threat

    Identity: The Leading Cloud Security Threat

    Identity-related weaknesses and outdated vulnerabilities are the main causes of the rise in cloud security incidents, with attackers exploiting these gaps to access sensitive systems and data. Excessive permissions and over-privileged cloud identities, affecting 99% of cases, allow attackers to m...

    Read More »
  • Top Infosec Products Launched This Week: July 2025

    Top Infosec Products Launched This Week: July 2025

    The cybersecurity landscape is evolving with new solutions like Cynomi's enhanced platform for business impact analysis and continuity planning, enabling proactive security measures. Tosibox launched TosiANTA, a native anomaly detection module for OT networks, offering quick deployment and improv...

    Read More »
  • Free VPN Apps Expose Major Security Risks

    Free VPN Apps Expose Major Security Risks

    A comprehensive analysis of free VPN applications revealed widespread security vulnerabilities, including outdated software and inadequate encryption, that fail to protect user data and privacy. Many free VPNs introduce greater risks than they prevent, with issues like susceptibility to man-in-th...

    Read More »