Cloud Security
A newly disclosed vulnerability named ImageRunner, uncovered by Tenable Research, exposed a subtle yet powerful privilege escalation pathway in Google Cloud Platform's Cloud Run service. This vulnerability, now patched by Google, allowed attackers with minimal permissions to illegitimately access and deploy private container images, effectively
In the evolving landscape of cybersecurity, staying ahead of threats is crucial. Organizations are increasingly seeking innovative solutions to protect their data against sophisticated cyber attacks. Veritas' NetBackup 11.0, recently bolstered by Cohesity’s acquisition, is among the latest offerings to address these challenges, introducing
In the past few years, the Asia-Pacific (APAC) region has reported a significant shift toward integrating security-first strategies within enterprise digital transformation efforts. This trend was evident at the recent Check Point Software’s CPX 2025 APAC conference in Bangkok, where industry leaders from various sectors discussed their approaches
Vernon Yai is a data protection expert specializing in privacy protection and data governance. An established thought leader in the industry, he focuses on risk management and the development of innovative detection and prevention techniques to safeguard sensitive information. Today, we will discuss the concept of homomorphic encryption, recent
March 2025 marked a crucial phase for Microsoft as it rolled out its Patch Tuesday updates, focusing primarily on addressing high-risk vulnerabilities. This month's update was particularly critical due to the inclusion of several zero-day exploits and Remote Code Execution (RCE) flaws alongside a wide array of vulnerabilities patched across