Unpatched security vulnerabilities
Several security breaches were observed at companies from different industries in which firewall devices from Palo Alto Network were involved.
Ubuntu Server
Researchers from the Qualys Threat Research Unit have discovered five vulnerabilities in the Ubuntu standard component “needrestart”. The vulnerabilities allow local privilege escalation (LPE) on affected systems.
Identity-based threats
Zscaler and Okta have unveiled four new integrations designed to accelerate zero trust transformation for their joint customers. These new solutions are designed to provide contextual end-to-end security.
Winners honored at "it-sa 2024"
The winners of the it security Awards 2024 have been announced. They were awarded in the categories Management Security, Internet/Web Security, Cloud Security and IAM. The following manufacturers were honored: Abstract Security, Lasso Security, BxC-Consulting and Nokod Security.
Gigabud and Spynote
Zimperium has published new findings on a security-critical malware campaign that combines features of two malicious programs.
Zimperium researchers’ research shows that both Gigabud and Spynote samples are currently being distributed via domains with similar structures and subdomains.
Automated API abuse by bots
Thales publishes the report “Economic Impact of API and Bot Attacks”.
Analysis of cybersecurity incidents reveals the rising global cost of insecure APIs and automated bot abuse, two security threats that are increasingly interconnected and widespread.
it-sa Special
In the increasingly digitalized industrial landscape, the challenges in cybersecurity have grown considerably in recent years.
The increase in targeted cyberattacks on operational technology (OT), i.e. control systems, devices and components in production facilities, is particularly worrying.
OT and IT must work closely together to ensure effective cybersecurity.
Guide for more safety
CIOs and CISOs are coming under pressure from various directions.
Mark Molyneux, EMEA CTO at Cohesity, provides recommendations in a guide on how companies can meet the following challenges.
Offline calculator
Experts at Ben-Gurion University of the Negev have hacked offline computers – i.e. systems that are not connected to a network such as the Internet.
Most Read Articles
31. March 2026
30. March 2026
19. March 2026