TechDay US - America's technology news network

Security vulnerabilities stories - Page 3

Security researcher analyzing complex network map with user icons clouds modern office

BeyondTrust launches Phantom Labs to boost identity security research

Tue, 5th Aug 2025
#
data science
#
iam
#
cybersecurity
BeyondTrust launches Phantom Labs, a specialised team to research identity security threats and enhance protection against identity exploitation in hybrid and cloud environments.
Developers engineers collaborating architectural diagrams code security modern office

Dawnguard raises USD $3m to embed security at design stage

Thu, 31st Jul 2025
#
devops
#
cloud security
#
apm
Amsterdam-based cybersecurity startup Dawnguard secures USD $3 million to embed security into system design, aiming to prevent risks from the development phase onwards.
Computer network shield icons alert symbols ai brain cybersecurity monitoring

Panaseer launches AI tool for real-time analysis of cyber risks

Wed, 30th Jul 2025
#
firewalls
#
network security
#
phishing
Panaseer has launched Key Drivers, an AI tool delivering real-time cybersecurity risk analysis to help organisations swiftly spot and address vulnerabilities.
Cloud with gears code shields surrounded by servers for it management

Azul launches Managed Services Programme for Java insights

Wed, 30th Jul 2025
#
application security
#
partner programmes
#
software development
Azul has launched a Managed Services Provider Programme to help partners offer Java asset management, security and code insights via its Intelligence Cloud platform.
Uk us office workers computers ai patterns data flows china map

Nearly 8% of UK & US staff use Chinese GenAI at work

Wed, 23rd Jul 2025
#
saas
#
data protection
#
martech
Nearly 8% of UK and US employees use Chinese generative AI tools at work, raising concerns over frequent exposure of sensitive corporate data, a study finds.
Ps morey haber  1

The Identity Epidemic: Why your business's digital front door is under siege

Mon, 21st Jul 2025
#
firewalls
#
digital transformation
#
network security
Identities have become the prime target in cybersecurity, with businesses urged to secure digital access through ownership, least privilege, MFA, and secret management.
Developers collaborating on software security fixing vulnerabilities digital shield icons

Cycode & HackerOne integrate to speed software vulnerability fixes

Fri, 18th Jul 2025
#
application security
#
risk & compliance
#
cybersecurity
Cycode and HackerOne partner to integrate bug bounty findings into Cycode's platform, speeding up vulnerability fixes and improving software security workflows.
Network server rack with shadowy figure hidden threat enterprise office

Windows Server 2025 flaw lets attackers persist in Active Directory

Thu, 17th Jul 2025
#
advanced persistent threat protection
#
iam
#
erp
A design flaw in Windows Server 2025 allows attackers to persist undetected in Active Directory by exploiting managed service account vulnerabilities.
Multiple hands grabbing gift cards digital shopping cart simultaneous redemption online checkout

Race condition in nopCommerce gift cards enables repeated use

Fri, 11th Jul 2025
#
devops
#
apm
#
e-commerce
A race condition vulnerability in nopCommerce gift cards lets attackers redeem the same card repeatedly, exploiting a flaw in the checkout process.
Modern office building split ai digital patterns and cracked security shields

Growing gap revealed between AI innovation & enterprise security

Thu, 26th Jun 2025
#
devops
#
supply chain
#
apm
A new report reveals a widening gap between AI innovation and enterprise security, with 36% of firms struggling to keep up with generative AI risks.
Digital security shield protecting interconnected app icons data streams

Outpost24 identifies key OAuth risks & best practice solutions

Sat, 21st Jun 2025
#
application security
#
iam
#
breach prevention
Outpost24 reveals seven common OAuth risks and offers best practices to help organisations prevent unauthorised access and data breaches through better token security.
Dark cloud over data servers glowing locks keys floating away risk

Poor cloud security leaves secrets & data at risk, report finds

Thu, 19th Jun 2025
#
hyperscale
#
public cloud
#
cloud security
A report finds poor cloud security and misconfigurations put sensitive data and secrets at risk across major public cloud providers worldwide.
Illustration smartphone laptop warning symbols fish hooks masked figures cyber threats apple devices

Jamf report finds phishing & infostealers surge on Apple devices

Wed, 18th Jun 2025
#
malware
#
endpoint protection
#
mdm
Jamf's Security 360 Report reveals a sharp rise in phishing and infostealers targeting Apple devices, urging organisations to strengthen cybersecurity measures.
Laptop connected to cloud icons with gears and automation symbols it automation cloud endpoint

Aiden Technologies now available in Azure Marketplace via MACC

Fri, 13th Jun 2025
#
paas
#
iaas
#
it automation
Aiden Technologies is now available in the Microsoft Azure Marketplace via MACC, enabling organisations to acquire its endpoint management platform using existing Azure funds.
Digital illustration supply chain linked chains boxes data symbols breaking spill

Adidas data breach highlights supply chain risk for retailers

Thu, 29th May 2025
#
data protection
#
phishing
#
martech
Adidas has suffered a data breach via a third-party provider, exposing customer information and highlighting rising cyber risks in retail supply chains.
Techday f 6ff748a261669589bbaa

Picus launches tool for real-time validation of exploitable risks

Fri, 23rd May 2025
#
semiconductors
#
devops
#
advanced persistent threat protection
Picus Security launches Exposure Validation, a tool using real-time attack simulations to identify which vulnerabilities are truly exploitable in organisations.
Techday f a9045e5e4f8aaafc236b

Google DeepMind reveals new strategy to defend Gemini 2.5 AI

Thu, 22nd May 2025
#
ai security
#
llms
#
cybersecurity
Google DeepMind has unveiled a new strategy to bolster Gemini 2.5 AI against indirect prompt injection attacks, enhancing its security and resilience.
Techday f a8cac32e79760ff5357c

Fintech sector faces mounting third-party security breach risks

Thu, 22nd May 2025
#
mfa
#
fintech
#
application security
Nearly 42% of data breaches in top fintech firms stem from third-party vendors, highlighting critical supply chain vulnerabilities despite strong internal security.
Techday f e898e9ba3e18be7a9cfc

Organisations prioritise AI security as GenAI adoption accelerates

Tue, 20th May 2025
#
malware
#
ransomware
#
encryption
Nearly 70% of organisations see AI, especially generative AI, as their top security risk, says Thales' 2025 Data Threat Report based on over 3,100 experts.
Techday f 8c6c32d38d37c2dbfa0c

Tenable One unifies risk data with new connectors & dashboards

Fri, 16th May 2025
#
cloud security
#
ai security
#
risk & compliance
Tenable launches connectors and customisable dashboards in Tenable One, unifying security data from multiple tools to enhance risk visibility and management.