MongoDB Queryable Encryption now supports range queries on encrypted data
17
Oct
2024

MongoDB Queryable Encryption now supports range queries on encrypted data

MongoDB Queryable Encryption allows customers to securely encrypt sensitive application data and store it in an encrypted format within the…

Kubernetes Vulnerability
17
Oct
2024

Critical Kubernetes Image Builder Vulnerability Exposes Nodes to Root Access Risk

Oct 17, 2024Ravie LakshmananVulnerability / Kubernetes A critical security flaw has been disclosed in the Kubernetes Image Builder that, if…

Critical Veeam Vulnerability Targeted By Hackers
17
Oct
2024

Critical Veeam Vulnerability Targeted By Hackers

Veeam has addressed a severe vulnerability in its widely utilized Backup & Replication tool, CVE-2024-40711. This critical flaw has a…

Anonymous Sudan Hackers Charged
17
Oct
2024

Anonymous Sudan Hackers Charged for Cyber Attacks on Critical Infrastructure

A federal grand jury indictment unsealed today charges two Sudanese nationals with operating and controlling Anonymous Sudan, an online cybercriminal…

Organization Hacked Following Accidental Hiring of North Korean Remote IT Worker - GBHackers Security
17
Oct
2024

Organization Hacked Following Accidental Hiring of North Korean Remote IT Worker – GBHackers Security

A company has fallen victim to a cyberattack after unknowingly hiring a North Korean cybercriminal as a remote IT worker….

CISA, FBI Call For Secure Software Development
17
Oct
2024

CISA, FBI Call For Secure Software Development

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have taken a significant step forward…

What is Certificate-Based Authentication? How it Works!
17
Oct
2024

What is Certificate-Based Authentication? How it Works!

Certificate-Based Authentication (CBA) is a robust security mechanism that has been a cornerstone in high-security environments for decades. It leverages…

CISA Adds 3 Known Exploited Vulnerabilities To Catalog
17
Oct
2024

CISA Adds 3 Known Exploited Vulnerabilities To Catalog

The Cybersecurity and Infrastructure Security Agency (CISA) has recently added three vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, emphasizing…

GhostStrike: Open-source tool for ethical hacking
17
Oct
2024

GhostStrike: Open-source tool for ethical hacking

GhostStrike is an open-source, advanced cybersecurity tool tailored for ethical hacking and Red Team operations. It incorporates cutting-edge techniques, including…

Organization Hacked by North Korean IT Worker
17
Oct
2024

Organization Hacked by North Korean IT Worker, Remote Hiring Gone Wrong

A recent cyberattack has highlighted the growing threat of North Korean operatives infiltrating Western companies by posing as remote IT…

How NIS2 will impact sectors from healthcare to energy
17
Oct
2024

How NIS2 will impact sectors from healthcare to energy

In this Help Net Security interview, Mick Baccio, Global Security Advisor at Splunk SURGe, discusses the far-reaching implications of the…

17
Oct
2024

Why companies are struggling to keep up with SaaS data protection

While businesses increasingly rely on SaaS tools, many leaders are not fully confident in their ability to safeguard their data,…