Alert: Pixel Phones’ Exploited Android Zero-Day Flaw Patched

In the realm of smartphone security, the recent spotlight has fallen on Google Pixel devices, where two zero-day vulnerabilities have been unearthed and promptly addressed by Google. As per recent reports, the ...
social engineering, attacks, media Media cybersecurity

Cisco Taps AI and eBPF to Automate Security Operations

Cisco today launched a framework that leverages artificial intelligence (AI) to test a software patch in a digital twin running on an endpoint to make sure an application doesn’t break before actually ...
Security Boulevard
adMarketplace Testimonial

Why Choose Akeyless over HashCorp Vault?

Artem Kazantsev, the Lead Security Engineer at adMarketplace, is committed to upholding the company’s reputation as a trusted consumer-centric advertising leader. With a steadfast dedication to protecting their clients’ sensitive data, including ...
Identity Security for Device Trust: Navigating 2024 & Beyond

Identity Security for Device Trust: Navigating 2024 & Beyond

In the rapidly evolving technology landscape, where our devices have become indispensable extensions of ourselves, ensuring their trustworthiness is paramount. Enter identity security for device trust, a concept that gained unprecedented significance ...
open source security

XZ Utils-Like Takeover Attempt Targets the OpenJS Foundation

The OpenJS Foundation, which oversees multiple JavaScript projects, thwarted a takeover attempt of at least one project that has echoes of the dangerous backdoor found in versions of the XZ Utils data ...
Security Boulevard
Randall Munroe’s XKCD ‘Survey Marker’

Randall Munroe’s XKCD ‘Survey Marker’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink ...
Elevating Kerberos to the Next Level

LSA Whisperer

Thank you to SpecterOps for supporting this research, to Elad for helping draft this blog, and to Sarah, Daniel, and Adam for proofreading and editing! Crossposted on GitHub.What follows is the culmination of ...
Akeyless's Distributed Fragments Cryptography (DFC) Demo

Akeyless DFC 101—A Zero-Knowledge Approach

| | DEVOPS, security
Akeyless DFC™ allows you to retain full ownership of your data while operating in a SaaS model. Take a peek under the hood to see how DFC keeps your data secure. The ...
Fostering Cyber Transparency with Richard Horne

Cyber Transparency: Shining a Light on Security

Jamie Cowper, VP of Marketing had the opportunity to sit down with Richard Horne, a distinguished member of the Noetic Advisory Board. Together, they discussed the challenges confronting organizations in the ever-evolving ...