SecurityBrief US - Technology news for CISOs & cybersecurity decision-makers

Security vulnerabilities stories - Page 3

Network server rack with shadowy figure hidden threat enterprise office

Windows Server 2025 flaw lets attackers persist in Active Directory

Thu, 17th Jul 2025
#
advanced persistent threat protection
#
iam
#
erp
A design flaw in Windows Server 2025 allows attackers to persist undetected in Active Directory by exploiting managed service account vulnerabilities.
Multiple hands grabbing gift cards digital shopping cart simultaneous redemption online checkout

Race condition in nopCommerce gift cards enables repeated use

Fri, 11th Jul 2025
#
devops
#
apm
#
e-commerce
A race condition vulnerability in nopCommerce gift cards lets attackers redeem the same card repeatedly, exploiting a flaw in the checkout process.
Modern office building split ai digital patterns and cracked security shields

Growing gap revealed between AI innovation & enterprise security

Thu, 26th Jun 2025
#
devops
#
supply chain
#
apm
A new report reveals a widening gap between AI innovation and enterprise security, with 36% of firms struggling to keep up with generative AI risks.
Digital security shield protecting interconnected app icons data streams

Outpost24 identifies key OAuth risks & best practice solutions

Sat, 21st Jun 2025
#
application security
#
iam
#
breach prevention
Outpost24 reveals seven common OAuth risks and offers best practices to help organisations prevent unauthorised access and data breaches through better token security.
Dark cloud over data servers glowing locks keys floating away risk

Poor cloud security leaves secrets & data at risk, report finds

Thu, 19th Jun 2025
#
hyperscale
#
public cloud
#
cloud security
A report finds poor cloud security and misconfigurations put sensitive data and secrets at risk across major public cloud providers worldwide.
Illustration smartphone laptop warning symbols fish hooks masked figures cyber threats apple devices

Jamf report finds phishing & infostealers surge on Apple devices

Wed, 18th Jun 2025
#
malware
#
endpoint protection
#
mdm
Jamf's Security 360 Report reveals a sharp rise in phishing and infostealers targeting Apple devices, urging organisations to strengthen cybersecurity measures.
Laptop connected to cloud icons with gears and automation symbols it automation cloud endpoint

Aiden Technologies now available in Azure Marketplace via MACC

Fri, 13th Jun 2025
#
paas
#
iaas
#
it automation
Aiden Technologies is now available in the Microsoft Azure Marketplace via MACC, enabling organisations to acquire its endpoint management platform using existing Azure funds.
Digital illustration supply chain linked chains boxes data symbols breaking spill

Adidas data breach highlights supply chain risk for retailers

Thu, 29th May 2025
#
data protection
#
phishing
#
martech
Adidas has suffered a data breach via a third-party provider, exposing customer information and highlighting rising cyber risks in retail supply chains.
Techday f 6ff748a261669589bbaa

Picus launches tool for real-time validation of exploitable risks

Fri, 23rd May 2025
#
semiconductors
#
devops
#
advanced persistent threat protection
Picus Security launches Exposure Validation, a tool using real-time attack simulations to identify which vulnerabilities are truly exploitable in organisations.
Techday f a9045e5e4f8aaafc236b

Google DeepMind reveals new strategy to defend Gemini 2.5 AI

Thu, 22nd May 2025
#
ai security
#
llms
#
cybersecurity
Google DeepMind has unveiled a new strategy to bolster Gemini 2.5 AI against indirect prompt injection attacks, enhancing its security and resilience.
Techday f a8cac32e79760ff5357c

Fintech sector faces mounting third-party security breach risks

Thu, 22nd May 2025
#
mfa
#
fintech
#
application security
Nearly 42% of data breaches in top fintech firms stem from third-party vendors, highlighting critical supply chain vulnerabilities despite strong internal security.
Techday f e898e9ba3e18be7a9cfc

Organisations prioritise AI security as GenAI adoption accelerates

Tue, 20th May 2025
#
malware
#
ransomware
#
encryption
Nearly 70% of organisations see AI, especially generative AI, as their top security risk, says Thales' 2025 Data Threat Report based on over 3,100 experts.
Techday f 8c6c32d38d37c2dbfa0c

Tenable One unifies risk data with new connectors & dashboards

Fri, 16th May 2025
#
cloud security
#
ai security
#
risk & compliance
Tenable launches connectors and customisable dashboards in Tenable One, unifying security data from multiple tools to enhance risk visibility and management.
Techday f 2cd32884ef6bc27c71e6

Dior & Nucor cyberattacks highlight risks for global firms

Thu, 15th May 2025
#
ransomware
#
martech
#
supply chain
Luxury brand Dior and US steel producer Nucor both face major cyberattacks, exposing vulnerabilities in fashion and industrial sectors globally.
Techday f 7489d3c30b1fe169cfe2

Lastwall IdP earns FedRAMP nod for quantum-ready Zero Trust

Thu, 8th May 2025
#
hybrid cloud
#
cloud security
#
advanced persistent threat protection
Lastwall's Identity Platform has earned FedRAMP Moderate Authorisation, enabling US federal agencies to deploy quantum-resistant Zero Trust cybersecurity solutions.
Techday f 3442109d4c83f7d53bc5

Kaspersky warns AI-generated passwords expose users to attacks

Wed, 7th May 2025
#
encryption
#
llms
#
ai
Kaspersky warns AI-generated passwords from ChatGPT, Llama, and DeepSeek often show predictable patterns, leaving users vulnerable to cyberattacks.
Techday f 94acda7c43b72eb9821f

Immersive launches live AppSec exercises to boost secure coding

Wed, 7th May 2025
#
application security
#
devsecops
#
cybersecurity
Immersive has launched AppSec Range Exercises, a live training tool to boost secure coding and improve application security in development teams.
Techday f 958ddf897a8be5c46101

Cloudhouse & ServiceNow join forces to boost IT governance

Mon, 5th May 2025
#
itsm
#
servicenow
#
security vulnerabilities
Cloudhouse partners with ServiceNow to boost IT governance via integrated Guardian platform, enhancing application compatibility and infrastructure visibility.
Techday f 9417f7b0900628fcf4bc

Businesses intensify efforts to secure data in cloud computing

Sat, 3rd May 2025
#
malware
#
firewalls
#
data protection
Businesses are boosting cloud security efforts as rising cloud adoption brings complex risks, requiring new strategies to protect sensitive data and maintain compliance.
Techday f 3434a6a948813689c5bd

Cloud Security Alliance report urges new defences for cloud

Fri, 2nd May 2025
#
devops
#
cloud security
#
iam
The Cloud Security Alliance's 2025 report reveals repeated cloud security failures, urging firms to bolster identity controls and shared defence measures.