Category: HelpnetSecurity

Amazon Inspector allows search of its vulnerability intelligence database
04
May
2023

Amazon Inspector allows search of its vulnerability intelligence database

Amazon Inspector is designed to manage vulnerabilities by continuously scanning your AWS workloads for software vulnerabilities and unintended network exposure…

Unpaid open source maintainers struggle with increased security demands
04
May
2023

Unpaid open source maintainers struggle with increased security demands

Ensuring the security of the open-source software that modern organizations depend on is a crucial responsibility of the open source…

Dashlane Passwordless Login eliminates the need to create a master password
03
May
2023

Dashlane Passwordless Login eliminates the need to create a master password

Dashlane introduced Passwordless Login, a technology that eliminates the need to create a master password to access Dashlane. The company…

Vanta Vendor Risk Management automates security reviews and remediates issues
03
May
2023

Vanta Vendor Risk Management automates security reviews and remediates issues

Vanta launched Vendor Risk Management (VRM) solution, enabling organizations to accelerate, automate and simplify third-party vendor security reviews and due…

You can now use passkeys to login into your Google account
03
May
2023

You can now use passkeys to login into your Google account

Users can now create passkeys for their Google account, the company has announced on Wednesday. Passkeys will enable users to…

Attackers are trying to exploit old DVR vulnerabilities (CVE-2018-9995, CVE-2016-20016)
03
May
2023

Attackers are trying to exploit old DVR vulnerabilities (CVE-2018-9995, CVE-2016-20016)

Five years ago, security researcher Fernandez Ezequiel discovered a vulnerability (CVE-2018-9995) in many digital video recorder (DVR) brands and released…

Immersive Labs Resilience Score strengthens executive decision making in cyber crises
03
May
2023

Immersive Labs Resilience Score strengthens executive decision making in cyber crises

Immersive Labs announced the launch of the Immersive Labs Resilience Score. The score measures an organization’s workforce preparedness for cyber…

T-Mobile suffers second data breach this year
03
May
2023

T-Mobile suffers second data breach this year

T-Mobile has revealed a second data breach that occurred in 2023, which reportedly exposed customer data and account PINs, leaving…

Google Chrome will lose the “lock” icon for HTTPS-secured sites
03
May
2023

Google Chrome will lose the “lock” icon for HTTPS-secured sites

In September 2023, Google Chrome will stop showing the lock icon when a site loads over HTTPS, partly due to…

Malicious content lurks all over the web
03
May
2023

Malicious content lurks all over the web

Attackers are finding new ways to evade detection and blend in with normal network traffic using HTTP and HTTPS to…

5 API security best practices you must implement
03
May
2023

5 API security best practices you must implement

As outside economic pressures continue to shape how organizations think and allocate resources, data security continues to be a high…

Tython: Open-source Security as Code framework and SDK
03
May
2023

Tython: Open-source Security as Code framework and SDK

Development teams utilize automation through Infrastructure as Code (IaC) to facilitate rapid and frequent changes to their cloud-native architectures. Security…