Threat posed by new VMware hyperjacking vulnerabilities is hard to overstate

Source

Three critical vulnerabilities in multiple virtual-machine products from VMware can give hackers unusually broad access to some of the most sensitive environments inside multiple customers’ networks, the company and outside researchers warned Tuesday. The class of attack made possible by exploiting the vulnerabilities is known under several names, including …

Google Cloud named a Leader in the 2025 Forrester Data Security Platforms Wave

Source

We're pleased to announce that Google has been recognized as a Leader in The Forrester WaveTM: Data Security Platforms, Q1 2025 report. We believe this is a testament to our unwavering commitment to providing cutting-edge data security in the cloud. In today's AI era, comprehensive data security is paramount …

2025 ISO and CSA STAR certificates now available with four additional services

Source

Amazon Web Services (AWS) successfully completed an onboarding audit with no findings for ISO 9001:2015, 27001:2022, 27017:2015, 27018:2019, 27701:2019, 20000-1:2018, and 22301:2019, and Cloud Security Alliance (CSA) STAR Cloud Controls Matrix (CCM) v4.0. EY CertifyPoint auditors conducted the audit and reissued …

Serbian student’s Android phone compromised by exploit from Cellebrite

Source

Amnesty International on Friday said it determined that a zero-day exploit sold by controversial exploit vendor Cellebrite was used to compromise the phone of a Serbian student who had been critical of that country's government. The human rights organization first called out Serbian authorities in December for what it …

« newer articles | page 60 | older articles »