Tag: access
-
Biometrie-Daten: Airlines sollen Zugriff auf Pass-Chips erhalten
Die Bundesregierung will privaten Fluglinien erlauben, biometrische Fotos von RFID-Chips im Ausweis auszulesen – für eine Minute Zeitersparnis. First seen on golem.de Jump to article: www.golem.de/news/biometrie-daten-airlines-sollen-zugriff-auf-pass-chips-erhalten-2603-206936.html
-
Who owns AI agent access? At most companies, nobody knows
AI agents are operating across production enterprise environments at scale, and the identity infrastructure managing their access has not kept up with their deployment. A … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/26/ciso-ai-agent-identity-security-report/
-
New critical Citrix NetScaler hole of similar severity to CitrixBleed2, says expert
CSO in an email, because the hole allows an unauthenticated remote attacker to leak potentially sensitive information from the appliance’s memory.”This vulnerability is one that threat actors and researchers alike are paying attention to,” he said.The vulnerability carries similar ramifications to 2023’s CitrixBleed and 2025’s CitrixBleed2 memory leak vulnerabilities, Emmons added. Then, unauthenticated attackers with…
-
Entro Security Launches AGA to Govern AI Agents and Non-Human Identities Across the Enterprise
Entro Security has announced Agentic Governance & Administration (AGA), a new pillar of its platform designed to help security and identity teams govern AI agents and AI access paths across enterprise systems. The company is showcasing AGA at RSA Conference 2026. The core problem AGA addresses is one that traditional Identity Governance and Administration (IGA)..…
-
AI Has Created a New Attack Surface and Encryption Is Not Enough
Tags: access, ai, attack, ciso, cryptography, cybersecurity, data, data-breach, defense, encryption, endpoint, exploit, framework, injection, intelligence, leak, LLM, microsoft, mitigation, network, risk, service, side-channel, sql, training, vulnerability<div cla Executive Insight For decades, enterprises relied on strong encryption to protect sensitive data in transit, and encryption used to be the end of the conversation. If an organization could say “we use TLS 1.3 and modern cipher suites,” that was enough to reassure boards, regulators, and customers that data in transit was…
-
AI Has Created a New Attack Surface and Encryption Is Not Enough
Tags: access, ai, attack, ciso, cryptography, cybersecurity, data, data-breach, defense, encryption, endpoint, exploit, framework, injection, intelligence, leak, LLM, microsoft, mitigation, network, risk, service, side-channel, sql, training, vulnerability<div cla Executive Insight For decades, enterprises relied on strong encryption to protect sensitive data in transit, and encryption used to be the end of the conversation. If an organization could say “we use TLS 1.3 and modern cipher suites,” that was enough to reassure boards, regulators, and customers that data in transit was…
-
Cyera Ships Browser Shield, Data Lineage, and MCP to Close AI Data Security Gaps
Cyera announced three new capabilities at RSAC 2026 on March 24: Browser Shield for AI, Data Lineage for files, and Cyera MCP. Together, they address two of the most pressing blind spots in enterprise AI security, what employees are sending into AI tools, and what happens to data after AI agents get access to it……
-
ConductorOne Launches AI Access Management to Govern AI Tools, Agents, and MCP Connections
ConductorOne announced AI Access Management on March 19, a new product extension that extends its identity governance platform to cover AI tools, AI agents, and Model Context Protocol (MCP) connections across the enterprise. The announcement came ahead of RSAC 2026 in San Francisco. The core problem ConductorOne is addressing is shadow AI proliferation. According to..…
-
GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data
Cybersecurity researchers have flagged a new evolution of the GlassWorm campaign that delivers a multi-stage framework capable of comprehensive data theft and installing a remote access trojan (RAT), which deploys an information-stealing Google Chrome extension masquerading as an offline version of Google Docs.”It logs keystrokes, dumps cookies and session tokens, captures screenshots, and First seen…
-
You Can’t Monetize What You Can’t See: AI Traffic Detection for Publishers
You can’t monetize what you can’t see. Learn how DataDome’s AI traffic detection helps publishers control access, stop content theft, and turn risk into revenue. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/you-cant-monetize-what-you-cant-see-ai-traffic-detection-for-publishers/
-
Paid AI Accounts Are Now a Hot Underground Commodity
AI accounts are becoming part of the cybercrime supply chain, sold like email accounts or VPS access. Flare Systems shows how underground markets bundle and resell premium AI access at scale. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/paid-ai-accounts-are-now-a-hot-underground-commodity/
-
Trivy supply chain breach compromises over 1,000 SaaS environments, Lapsus$ joins the extortion wave
Tags: access, breach, business, ceo, control, credentials, extortion, github, incident response, Internet, malicious, mandiant, open-source, saas, software, supply-chain, theft, updateA pattern of persistent access: This is the second compromise affecting the Trivy ecosystem within roughly a month. Socket identified compromised Aqua Trivy VS Code extension releases on OpenVSX in late February, and now trivy-action, Trivy’s official GitHub Action for running scans in CI/CD workflows, has been abused through manipulated version tags to distribute malicious…
-
PyPI warns developers after LiteLLM malware found stealing cloud and CI/CD credentials
Tags: access, advisory, api, attack, cloud, container, credentials, data, exploit, extortion, github, group, infrastructure, malicious, malware, open-source, pypi, supply-chain, tactics, tool, vulnerabilityAn expanding supply-chain campaign: The LiteLLM incident has been confirmed to be a part of the rapidly unfolding TeamPCP supply chain campaign that first compromised Trivy.Trivy, developed by Aqua Security, is a widely used open-source vulnerability scanner designed to identify security issues in container images, file systems, and infrastructure-as-code (IaC) configurations. The ongoing attack, attributed…
-
6 key trends reshaping the IAM market
Tags: access, ai, attack, authentication, ciso, compliance, corporate, cyber, cybersecurity, data, dora, finance, framework, governance, government, Hardware, iam, identity, mfa, mobile, network, nis-2, passkey, password, PCI, phone, regulation, saas, service, startup, strategy, technologyPasswordless authentication on the rise: Passwords have long been the weakest link in most security architectures.Many mobile phones and laptops already use biometrics for authentication, and the user experience is typically far better than typing a long and complex password into an interface.The growing uptake of passwordless authentication (FIDO2/passkeys, biometrics) is redefining the scope of…
-
6 key trends reshaping the IAM market
Tags: access, ai, attack, authentication, ciso, compliance, corporate, cyber, cybersecurity, data, dora, finance, framework, governance, government, Hardware, iam, identity, mfa, mobile, network, nis-2, passkey, password, PCI, phone, regulation, saas, service, startup, strategy, technologyPasswordless authentication on the rise: Passwords have long been the weakest link in most security architectures.Many mobile phones and laptops already use biometrics for authentication, and the user experience is typically far better than typing a long and complex password into an interface.The growing uptake of passwordless authentication (FIDO2/passkeys, biometrics) is redefining the scope of…
-
6 key trends reshaping the IAM market
Tags: access, ai, attack, authentication, ciso, compliance, corporate, cyber, cybersecurity, data, dora, finance, framework, governance, government, Hardware, iam, identity, mfa, mobile, network, nis-2, passkey, password, PCI, phone, regulation, saas, service, startup, strategy, technologyPasswordless authentication on the rise: Passwords have long been the weakest link in most security architectures.Many mobile phones and laptops already use biometrics for authentication, and the user experience is typically far better than typing a long and complex password into an interface.The growing uptake of passwordless authentication (FIDO2/passkeys, biometrics) is redefining the scope of…
-
6 key trends reshaping the IAM market
Tags: access, ai, attack, authentication, ciso, compliance, corporate, cyber, cybersecurity, data, dora, finance, framework, governance, government, Hardware, iam, identity, mfa, mobile, network, nis-2, passkey, password, PCI, phone, regulation, saas, service, startup, strategy, technologyPasswordless authentication on the rise: Passwords have long been the weakest link in most security architectures.Many mobile phones and laptops already use biometrics for authentication, and the user experience is typically far better than typing a long and complex password into an interface.The growing uptake of passwordless authentication (FIDO2/passkeys, biometrics) is redefining the scope of…
-
Microsoft hands Entra ID users new option for MFA
Organizations rely on MFA to enforce identity checks before granting access to systems and services. Microsoft has made external MFA generally available in Microsoft Entra ID, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/25/microsoft-entra-id-external-mfa/
-
Could AI Replace the CEO? Zuckerberg’s ‘CEO Agent’ Sparks Debate
Mark Zuckerberg is building a personal AI agent to help him run Meta, and the move has reignited a debate that the tech industry has long been circling: could AI one day replace the most senior roles in business? According to reports, the still-in-development system is designed to help Zuckerberg access information more quickly, cutting…
-
Hackers Exploiting Magento Flaw to Execute Remote Code and Seize Full Account Access
A critical vulnerability dubbed >>PolyShell<< is actively being exploited across Magento and Adobe Commerce platforms. Discovered by the Sansec Forensics Team and published on March 17, 2026, this flaw allows unauthenticated attackers to upload executable files via the platform's REST API. Because no official patch currently exists for production versions, thousands of online stores are…
-
SmartApeSG ClickFix Campaign Spreads Remcos, NetSupport RAT, StealC, Sectop RAT
A recent SmartApeSG campaign observed on March 24, 2026, highlights the growing sophistication of ClickFix-based attack chains, which deliver multiple remote access trojans (RATs) and information stealers through a staged infection process. The infection begins with the ClickFix technique, where victims are redirected from a compromised legitimate website to a fake CAPTCHA page. This page…
-
How do Non-Human Identities manage access?
Are You Overlooking the Crucial Role of Non-Human Identities in Access Management? Managing Non-Human Identities (NHIs) is no longer a luxury but a necessity for robust cybersecurity. These NHIs represent machine identities, pivotal in maintaining the security protocols inherent in automated systems. The growing reliance on technology across industries necessitates an understanding of their importance….…
-
Securden Unveils Unified Identity Security Platform at RSAC 2026, Combining PAM, EPM, IGA, and More
Securden launched what it calls the world’s first truly unified identity security platform at RSA Conference 2026, consolidating privileged access management, endpoint privilege management, identity governance, cloud entitlement management, non-human identity security, and AI agent security into a single product. The announcement targets a persistent problem in enterprise security: organizations typically address these identity security..…
-
Effective API Security Testing Strategies for Modern Application Environments
Modern apps no longer have well-defined boundaries. In today’s SaaS ecosystem of cloud-native applications and hybrid setups, a mix of internal and third-party APIs often serve as the primary pipelines through which apps access information. Almost all transactions, whether authentication, data transfer or workflow automation, happen through APIs, which centralize access to business-critical data. The..…
-
SQL Server Ransomware Attacks: How They Work and How to Harden Your Database
Key Takeaways â— Documented SQL Server attacks have moved from initial access to ransomware deployment within the hour when exposure is high and defenses are absent, but attack timelines vary widely depending on privileges, host controls, segmentation, and attacker quality. â— Attackers escalate from SQL privileges to OS […] The post SQL Server Ransomware Attacks:…
-
Introducing the Identity and Access Gaps in the Age of Autonomous AI Survey Report
2 min readThe Trivy incident exposed a credential architecture failure, not just a supply chain one. Here’s the case for workload identity and access. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/introducing-the-identity-and-access-gaps-in-the-age-of-autonomous-ai-survey-report/

