Coordinated Exploitation Campaign Targets Grafana Vulnerability
Attackers target unpatched Grafana systems via CVE-2021-43798. Learn how patching, monitoring, and zero trust reduce risk.
Attackers target unpatched Grafana systems via CVE-2021-43798. Learn how patching, monitoring, and zero trust reduce risk.
Hey yall, I've been tasked with setting up a zero trust solution to our contractors, there's a BYOD situation there with some internal apps on our side. I've heard good and bad things about Island, but I was also considering something simpler like Zscaler third party access or Menlo which to my understanding don't require an agent or any installation. But in that case I guess that they don't cover device posture.. Should that be a deal breaker? Appreciate any input here, thanks! submitted by...
As identity security becomes increasingly critical in cybersecurity, the focus has shifted from safeguarding human identities to protecting Non-Human Identities (NHIs) - such as API keys, service accounts, secrets, tokens, and certificates. While...
CISA says microsegmentation isn't optional - it's foundational to Zero Trust. But legacy methods make it slow & complex. Learn from Zero Networks how modern, automated, agentless approaches make containment practical for every org.
Came across this press release, thought others may find it interesting. TL:DR, Siemens released SINEC Secure Connect for managing communication connections in OT networks, which virtualizes network structures and protects shop floor devices from targeted attacks and unauthorized access. It supports several use cases and architectures, including Machine-to-Machine, Machine-to-Cloud, and Machine-to-Datacenter connections, plus secure remote access to industrial systems - all without traditional...
arXiv:2509.25566v1 Announce Type: new Abstract: The rise of autonomous vehicles (AVs) promises to significantly enhance transportation safety and efficiency by mitigating human error, which is responsible for over 90\% of road accidents. However, the increasing connectivity of AVs introduces new cybersecurity challenges, as traditional perimeter-based security models are inadequate for dynamic and untrusted environments. This paper presents a novel Zero Trust-based Decentralized Identity...
arXiv:2509.22663v1 Announce Type: new Abstract: We define a practical method to quantify the trade-off between security and operational friction in modern identity-centric programs. We introduce the Security Friction Quotient (SFQ), a bounded composite index that combines a residual-risk estimator with empirically grounded friction terms (latency, failure rate, and helpdesk impact). We establish clarity properties (boundedness, monotonic response, and weight identifiability) with short proofs,...
I've been exploring alternative paradigms to traditional "security by design" and "zero trust." With the rise of quantum computing and post-quantum resilience requirements, it's clear that constant availability may no longer be a sustainable assumption. This draft introduces Security by Non-Functioning through Quantum-Hybrid Randomized Superpositional Unavailability (QSU). • System availability exists in a superpositional state (functioning and non-functioning) until explicitly inspected. •...
While zero trust is championed within the cybersecurity industry today, Kindervag said he was met with a tough crowd when his report on the concept was published in 2010. "The first reactions to zero trust were, 'That's a dumb idea. You're an idiot. It's never going anywhere. Why'd you write this report?'" Kindervag said. submitted by /u/BrooklynShatterDome [link] [comments]
submitted by /u/digicat [link] [comments]
We're seeing more "perfect" messages - native idioms, brand-matched PDFs, even convincing voice calls. Shiny tools help, but the core is Zero Trust habits: assume channels are compromised; verify identity and authorization every time. Key ideas I'm proposing: Trust no channel; verify every request. For any money move, access change, or data exfil risk: do out-of-band verification using a known number/video/passphrase or signed approval. Make this muscle memory. A one-page AI usage policy anyone...
arXiv:2509.16390v1 Announce Type: new Abstract: Roaming settlement in 5G and beyond networks demands secure, efficient, and trustworthy mechanisms for billing reconciliation between mobile operators. While blockchain promises decentralization and auditability, existing solutions suffer from critical limitations-namely, data privacy risks, assumptions of mutual trust, and scalability bottlenecks. To address these challenges, we present B5GRoam, a novel on-chain and zero-trust framework for...
Integrations Unite Endpoint and Network Data to Enhance Zero Trust Access and Accelerate SOC Response Versa, the global leader in Universal Secure Access Service Edge (SASE), today announced new integrations with the CrowdStrike Falcon(R) platform at Fal.Con 2025. Now available in the CrowdStrike Marketplace, the integrations - including support for...
Every vendor pitches "Zero Trust everywhere" like it's easy. Reality for us: IAM sprawl, too many service accounts, and conditional access policies that feel like duct tape. We're multi-cloud (AWS + GCP) and trying to align with NIST Zero Trust principles, but enforcing least privilege without breaking stuff has been brutal. Anyone got a cloud-native setup they trust that doesn't devolve into constant exceptions? submitted by /u/Zaughtilo [link] [comments]
Fal.Con 2025 - Dispersive Holdings, Inc. (Dispersive(R)), the leader in stealth networking for secure and resilient communications, today at Fal.Con 2025 announced a new integration with the AI-native CrowdStrike Falcon(R) platform. The joint solution unifies endpoint, identity, and network context to help customers contain threats faster, strengthen zero trust security, and reduce complexity. The...
Every vendor slaps zero trust on their product like its a magic shield. But actually implementing it is horror. Identity layers, device checks, least privilege, micro segmentation never ending process. We are halfway in, but the cultural change is harder than the tech. how true is end to end zero trust implementation? submitted by /u/Soft_Attention3649 [link] [comments]
I'm currently working as a Cybersecurity Analyst Intern where I'm getting a lot of hands-on exposure with logs, detections, and developing an analyst mindset. I'll be graduating in ~6 months and moving into full-time work, but I'm a bit stuck on what direction to double down on next. I see two clear paths: Security Engineering / Infra side - I love Linux, cloud, and self-hosting. I've built a homelab (Proxmox, Linux/Windows VMs, Pi-hole, Nextcloud, Cloudflare Zero Trust, etc.), and I enjoy...
Xage Security, a global leader in Zero Trust access and protection, today announced a first-of-its-kind unified Zero Trust platform designed to secure AI environments. Built on the same proven Zero Trust principles Xage uses to protect the world's most critical infrastructure, the platform delivers granular, reliable, and enforceable control over AI data...
arXiv:2509.08248v1 Announce Type: new Abstract: We propose a flood-based relay communication protocol that achieves end-to-end encryption, plausible deniability for users, and untraceable messages. It is resistant to changes in topology and infrastructure failures. It is also designed to hide metadata, such as sender and receiver, from those not involved.