
Uncovering the Dark Matter of Identity
In modern architectures, identity no longer lives only in the directories and consoles of IAM. The applications, the APIs, the service accounts and the authentication mechanisms t…
News related to computer security, privacy and data protection

In modern architectures, identity no longer lives only in the directories and consoles of IAM. The applications, the APIs, the service accounts and the authentication mechanisms t…

Microsoft has started natively integrating Sysmon's functionality into some Windows 11 facilities within the Windows Insider program. This is a relevant change: instead of relying…

When a security alert appears, it is not always a counter-clock race to win the attacker; often the difference between containing an incident and losing control is in the decision…

In recent months, threat response teams have seen a paradigm shift: campaigns that steal credentials and secrets are no longer an exclusive Windows problem and begin to thrive in …

The Eclipse Foundation has decided to take a significant step to tighten the security of its Open VSX extension repository, the alternative record where accessories compatible wit…

In the last week, a coordinated recognition campaign was detected that targeted Citrix NetScaler infrastructure (also known as Citrix ADC). According to the analysis published by …

The news that Iron Mountain was mentioned in the leaks portal of the Everest group turned on the alarms of many organizations, so it is appropriate to separate the confirmed from …

A critical vulnerability on the Metro development server, used by many React Native-based applications, is being exploited in real environments and poses a hard reminder for those…

A few years ago, security teams worked to put walls, locks and processes around human and service identities. Today, this model begins to show fissures: a new kind of identity - t…