Searchlight Cyber launches Exposure Data view in DarkIQ
Searchlight Cyber has launched a new Exposure Data view in DarkIQ, collating 450+ billion dark web data points from data breaches and malware infection to…
Searchlight Cyber has launched a new Exposure Data view in DarkIQ, collating 450+ billion dark web data points from data breaches and malware infection to…
Forescout detailed the discovery of 21 new vulnerabilities in OT/IoT routers and open-source software elements. The “SIERRA:21 – Living on the Edge” report features research…
How do companies protect their digital environments in a world where everything is growing more complex, quickly – data, customer expectations, cyber threats and more?…
Kubernetes, often called K8s, is an open-source platform designed to automate the deployment, scaling, and operations of containerized applications. Kubernetes has become a critical part…
Firms that actively harness generative AI to enhance experiences, offerings, and productivity will realize outsized growth and will outpace their competition, according to Forrester. Between…
OffSec (previously Offensive Security) has released Kali Linux 2023.4, the latest version of its penetration testing and digital forensics platform. New tools in Kali Linux…
CellTrust introduces SL2 Moderator AI for financial advisors and compliance officers to stop data leakage and block risky mobile messages before they are sent to…
Russian state-backed hacking group Forest Blizzard (aka Fancy Bear, aka APT28) has been using a known Microsoft Outlook vulnerability (CVE-2023-23397) to target public and private…
Rambus has unveiled the availability of a Quantum Safe Engine (QSE) for integration into hardware security elements in ASICs, SoCs and FPGAs. Quantum computers will…
Global Integrity announced the newest version of the company’s secure communications solution, QTel, which offers advanced features and stronger encryption. Formerly Qphone, the new QTel…
SessionProbe is a multi-threaded pentesting tool designed to evaluate user privileges in web applications. It takes a user’s session token and checks for a list…
Catching coding errors in API preproduction, before they are spun up and go live is critical in preventing exploitable vulnerabilities. It’s why we’ve seen “shift…