20.4 C
New York

Tag: Dark reading

Patch Madness: Vendor Bug Advisories Are Broken, So Broken

BLACK HAT USA – Las Vegas – Keeping up with security-vulnerability patching is challenging at best, but prioritizing which bugs to focus on has...

Top News

Multiple Vulnerabilities Discovered in Device42 Asset Management Appliance

A series of vulnerabilities on the popular asset management platform Device42 could be exploited to give attackers full root access to the system, according...

Deepfence ThreatMapper 1.4 Unveils Open Source Threat Graph to Visualize Cloud-Native Threat Landscape

SAN FRANCISCO---Deepfence, a pioneer in the emerging security observability and protection space, today announced the 1.4 release of its open source project ThreatMapper, a cutting-edge, cloud native...

Software Development Pipelines Offer Cybercriminals 'Free-Range' Access to Cloud, On-Prem

Continuous integration/continuous development (CI/CD) pipelines may be the most dangerous potential attack surface of the software supply chain, researchers say, as cyberattackers step up...

Don't Take the Cyber Safety Review Board's Log4j Report at Face Value

The most significant finding in the Cyber Safety Review Board's voluminous analysis of the Log4j vulnerability is what it didn't observe.The board is "not...

10 Malicious Code Packages Slither into PyPI Registry

Administrators of the Python Package Index (PyPI) have removed 10 malicious software code packages from the registry after a security vendor informed them about the...

HYAS Infosec Announces General Availability of Cybersecurity Solution for Production Environments

VICTORIA, British Columbia--Leading security technology firm HYAS Infosec — whose proactive solutions ensure that businesses can keep moving full forward in our ever-changing world — today...
Tag Template - News Hub PRO

What Worries Security Teams About the Cloud?

As many enterprises shift their operations to cloud, security teams are grappling with multiple security concerns such as visibility, data security, compliance, and data...

A Digital Home Has Many Open Doors

What our homes mean to us has been redefined over the COVID era. We now work, rest, and play within its boundaries, not only...

Cyberattackers Increasingly Target Cloud IAM as a Weak Link

Cybercriminals always look for blind spots in access management, be they misconfigurations, poor credentialing practices, unpatched security bugs, or other hidden doors to the...

Massive China-Linked Disinformation Campaign Taps PR Firm for Help

A fake-news influence campaign based in China is leveraging at least 72 inauthentic news sites to push content strategically aligned with the political interests...

New Startup Footprint Tackles Identity Verification

Whenever a person walks into a financial services institution to open a bank account, apply for a loan, or obtain a credit card, that...

Zero-Day Defense: Tips for Defusing the Threat

The recent Atlassian Confluence remote code execution bug is just the latest example of zero-day threats targeting critical vulnerabilities within major infrastructure providers. The...
Tag Template - News Hub PRO

Recent articles

spot_img