Category: HelpnetSecurity

Tenable unveils agentless container scanning to prevent vulnerable containers from reaching runtime
19
Jul
2023

Tenable unveils agentless container scanning to prevent vulnerable containers from reaching runtime

Tenable announced new Tenable Cloud Security features that deliver automated operating system (OS) vulnerability detection across container images, registries and…

Code42 helps security analysts to address the most pressing insider events with IRIs
19
Jul
2023

Code42 helps security analysts to address the most pressing insider events with IRIs

Code42 has added custom Insider Risk Indicators (IRIs) to its Incydr data protection solution. This addition enables security teams to…

U.S. Cyber Trust Mark labeling program raises the bar for smart devices' cybersecurity
19
Jul
2023

U.S. Cyber Trust Mark labeling program raises the bar for smart devices’ cybersecurity

The Biden-Harris Administration has announced a cybersecurity certification and labeling program to help Americans more easily choose smart devices that…

Using AI/ML to optimize your tech stack and enhance business efficiency
19
Jul
2023

Using AI/ML to optimize your tech stack and enhance business efficiency

In this Help Net Security interview, Arthur Hu, SVP, Global CIO and Services & Solutions Group CTO at Lenovo, discusses…

Trends in ransomware-as-a-service and cryptocurrency to monitor
19
Jul
2023

Trends in ransomware-as-a-service and cryptocurrency to monitor

In January, law enforcement officials disrupted the operations of the Hive cybercriminal group, which profited off a ransomware-as-a-service (RaaS) business…

Supply chain executives unaware of growing customer trust issues
19
Jul
2023

Supply chain executives unaware of growing customer trust issues

Supply chain executives significantly overestimate stakeholder trust in their supply chain capabilities and intentions, according to Deloitte. Of more than…

eBook: 9 Ways to Secure Your Cloud App Dev Pipeline
19
Jul
2023

eBook: 9 Ways to Secure Your Cloud App Dev Pipeline

Improve your cloud security with these 9 proven strategies. Uptycs, alongside renowned expert Lee Atchison, share their list of comprehensive…

Splunk Edge Hub provides visibility across IT and OT environments
18
Jul
2023

Splunk Edge Hub provides visibility across IT and OT environments

Splunk announced Splunk Edge Hub, a new solution that simplifies the ingestion and analysis of data generated by sensors, IoT…

Adobe ColdFusion vulnerabilities exploited to deliver web shells (CVE-2023-29298, CVE-2023-38203)
18
Jul
2023

Adobe ColdFusion vulnerabilities exploited to deliver web shells (CVE-2023-29298, CVE-2023-38203)

Attackers are exploiting two Adobe ColdFusion vulnerabilities (CVE-2023-29298, CVE-2023-38203) to breach servers and install web shells to enable persistent access…

KYB by ComplyAdvantage automates customer onboarding and monitoring
18
Jul
2023

KYB by ComplyAdvantage automates customer onboarding and monitoring

One of the biggest challenges faced by regulated and non-regulated companies is assessing whether or not another business is safe…

Healthcare organizations in the crosshairs of cyberattackers
18
Jul
2023

Healthcare organizations in the crosshairs of cyberattackers

In an era where cyber threats continue to evolve, healthcare organizations are increasingly targeted by malicious actors employing multiple attack…

12 open-source penetration testing tools you might not know about
18
Jul
2023

12 open-source penetration testing tools you might not know about

Red Siege has developed and made available many open-source tools to help with your penetration testing work. The company plans…