Cloud storage databases, often deployed as "rogue servers" without the blessing of the IT department, continue to put companies and their sensitive data at risk.
Read moreAn Untrustworthy TLS Certificate in Browsers
November 10 2022The major browsers natively trust a whole bunch of certificate authorities, and some of them are really sketchy:
Google’s Chrome, Apple’s Safari, nonprofit Firefox and others allow the company,...
Read more
How to Close Kubernetes’ Network Security Gap
November 10 2022StackRox bridges network security and other gaps and makes applying and managing network isolation and access controls easier while extending Kubernetes' automation and scalability benefit.
Read moreFlashpoint Releases Ransomware Prediction Model for Vulnerabilities
November 10 2022Links individual vulnerabilities to those known to have been used in ransomware operations, helping vulnerability management teams prevent potential cyber extortion events with VulnDB.
Read moreTechnology consolidates Windows and Linux software risk together in one UI, helping teams manage vulnerabilities and comply with new regulatory standards.
Read moreLacework Extends CNAPP Capabilities With Attack Path Analysis and Agentless Workload Scanning
November 10 2022Greater insight into attack paths and runtime visibility helps customers reduce risk and improve cloud security posture.
Read moreUnderstanding the Rise of Risk-Based Vulnerability Management
November 10 2022Risk-based vulnerability management solutions foster the convergence of risk management and vulnerability management. Andrew Braunberg explains what’s driving the emergence of RBVM.
Read moreEmergency code execution patch from Apple – but not an 0-day
November 10 2022Not a zero-day, but important enough for a quick-fire patch to one system library...
Read moreMalicious Python Package Relies on Steganography to Download Malware
November 10 2022The malicious package downloads an image from the Web, then uses a steganography module to extract and execute the code to download malware.
Read moreHole-y software alert, Batman: Cybercriminal faves Citrix Gateway and VMware Workspace ONE have authentication-bypass bugs that could offer up total access to attackers.
Read more
Recent Comments