Kubernetes RCE Vulnerability Allows Remote Code Execution

Tomer Peled, an Akamai cybersecurity security researcher, recently discovered a Kubernetes RCE vulnerability that allows threat actors to remotely execute code on Windows endpoints. Not only this but the threat actors can ...

2022’s Most Exploited Vulnerabilities: Insights and Future Preparedness

The cybersecurity landscape is a dynamic battlefield where attackers constantly seek out vulnerabilities to exploit. In this context, the release of the list of top 12 routinely exploited vulnerabilities by CISA in ...

What You Need to Know About SBOM Generation Tools

When it comes to tools for generating a software bill of materials (SBOM), organizations basically have three options: use a software composition analysis (SCA) product, deploy an open source command-line interface (CLI) ...

Report Finds More Organizations Are Creating SBOMs

The idea of creating SBOMs (Software Bills of Materials) is catching on with organizations, according to a new survey from Ponemon Institute and Rezilion. But generating an SBOM in and of itself ...

The Time is Now to Eliminate Vulnerability Backlogs

There are three things in life you can count on: death, taxes, and vulnerability backlogs.  Eliminating them has become a major thorn in the side of DevSecOps professionals because it’s not always ...
Kasa Security

Kasa Camera Vulnerability Discovery: Responsible Disclosures Feel Like Groundhog Day, Again

When APIs Say Too Much As a Midwesterner and hobby farmer I spend a lot of time solving problems. A few months ago I encountered a problem where a live 2-month-old cucumber ...

It’s Time to Stop Waiting for Application Security to Find You

If software is the gooey center of the business world, what can we do to harden it? As a CISO, business manager, industry… The post It’s Time to Stop Waiting for Application ...