Category: HelpnetSecurity
The Computer Emergency Response Team of Ukraine (CERT-UA), part of the State Service of Special Communications and Information Protection (SSSCIP),…
The CWE list of the 25 most dangerous software weaknesses demonstrates the currently most common and impactful software flaws. Identifying…
AxoSyslog is a syslog-ng fork, created and maintained by the original creator of syslog-ng, Balazs Scheidler, and his team. “We…
Human-led penetration testing is an essential practice for any organization seeking to proactively address potential attack vectors. However, this indispensable…
In this Help Net Security interview, Brooke Motta, CEO of RAD Security, talks about how cloud-specific threats have evolved and…
In 2024, businesses reported taking an average of 7.3 months to recover from cybersecurity breaches – 25% longer than expected…
Oracle Linux offers a secure, streamlined platform for deploying and managing applications across on-premises, cloud, and edge environments. Designed for…
GitHub is calling on maintainers of open source projects to apply for the newly opened Secure Open Source Fund, to…
Apple has released emergency security updates for macOS Sequoia that fix two zero-day vulnerabilities (CVE-2024-44309, CVE-2024-44308) that “may have been…
Tanium announced Tanium Cloud Workloads, providing real-time visibility and protection for containerized environments. Through image vulnerability scanning, container run-time inventory,…
Arkose Labs launched Arkose Device ID, a device identification solution that raises the bar in fraud detection by combining precise…
The ransomware attack on UnitedHealth earlier this year is quickly becoming the healthcare industry’s version of Colonial Pipeline, prompting congressional testimony,…