Application security, Security
September 12, 2023
Via: Help Net SecurityCTERA unveiled CTERA Vault, Write Once, Read Many (WORM) protection technology which provides regulatory compliant storage for the CTERA Enterprise Files Services Platform. CTERA Vault aids enterprises in guaranteeing the preservation and tamperproofing of their data, while also ensuring compliance […]
Threats & Malware, Vulnerabilities
August 23, 2023
Via: The Hacker NewsDevelopers are not the only people who have adopted the agile methodology for their development processes. From 2023-06-15 to 2023-07-11, Permiso Security’s p0 Labs team identified and tracked an attacker developing and deploying eight (8) incremental iterations of their credential […]
August 8, 2023
Via: The Hacker NewsIntroduced in 1999, Microsoft Active Directory is the default identity and access management service in Windows networks, responsible for assigning and enforcing security policies for all network endpoints. With it, users can access various resources across networks. As things tend […]
July 14, 2023
Via: The Hacker NewsA malicious actor has been linked to a cloud credential stealing campaign in June 2023 that’s focused on Azure and Google Cloud Platform (GCP) services, marking the adversary’s expansion in targeting beyond Amazon Web Services (AWS). The findings come from […]
July 11, 2023
Via: The Hacker NewsCloud environments continue to be at the receiving end of an ongoing advanced attack campaign dubbed SCARLETEEL, with the threat actors now setting their sights on Amazon Web Services (AWS) Fargate. “Cloud environments are still their primary target, but the […]
Application security, Security
July 10, 2023
Via: The Hacker NewsBrick-and-mortar retailers and e-commerce sellers may be locked in a fierce battle for market share, but one area both can agree on is the need to secure their SaaS stack. From communications tools to order management and fulfillment systems, much […]
Application security, Security
June 23, 2023
Via: The RegisterChina has a playbook to use IP theft to seize leadership in cloud computing, and other nations should band together to stop that happening, according to Nathaniel C. Fick, the US ambassador-at-large for cyberspace and digital policy. Speaking at an […]
April 28, 2023
Via: Dark ReadingUptycs, provider of the first unified CNAPP and XDR platform, today announced the ability to collect and analyze GitHub audit logs and user identity information from Okta and Azure Active Directory (Azure AD) to reveal suspicious behavior as the developer […]
April 27, 2023
Via: Dark ReadingAfter a 13-year-long wait, Google Authenticator has added a 2FA account-sync feature that allows its users to back up their 2FA code sequences into the cloud, after which they can restore them back into a new device. Though the process […]
Application security, Security
April 26, 2023
Via: Dark ReadingDig, the cloud data security leader, today announced its new technology integration with CrowdStrike, a leader in cloud-delivered protection of endpoints, cloud workloads, identity, and data. The Dig Data Security Platform integrates with the CrowdStrike Falcon platform to deliver real-time […]
Application security, Security
April 26, 2023
Via: Dark ReadingThe coalition behind the Data Security Maturity Model has issued a second iteration of the framework, aimed at making it easier for businesses to protect data from leaks. The coalition, created by Cyberhaven last summer, is led by Sounil Yu, […]
April 25, 2023
Via: The Hacker NewsSearch giant Google on Monday unveiled a major update to its 12-year-old Authenticator app for Android and iOS with an account synchronization option that allows users to back up their time-based one-time passwords (TOTPs) to the cloud. “This change means […]
April 25, 2023
Via: The Hacker NewsGoogle’s cloud division is following in the footsteps of Microsoft with the launch of Security AI Workbench that leverages generative AI models to gain better visibility into the threat landscape. Powering the cybersecurity suite is Sec-PaLM, a specialized large language […]
April 5, 2023
Via: The Hacker NewsEvery year hundreds of millions of malware attacks occur worldwide, and every year businesses deal with the impact of viruses, worms, keyloggers, and ransomware. Malware is a pernicious threat and the biggest driver for businesses to look for cybersecurity solutions. […]
March 31, 2023
Via: Help Net SecurityAs IT infrastructure becomes more diverse, organizations face the challenge of integrating data management and control, according to Nutanix. The research showed that the majority of IT teams leverage more than one IT infrastructure, a trend that’s expected to intensify […]
March 15, 2023
Via: Help Net SecurityCloudflare is entering the fraud detection market to help businesses identify and stop online fraud – including fraudulent transactions, fake account signups, account takeover attacks, and carding attacks – before it impacts their brand or their bottom line. Powered by […]
February 17, 2023
Via: Help Net SecurityIGEL has announced IGEL COSMOS, a unified platform to securely manage and automate the delivery of digital workspaces, from any cloud. Offering a modular architecture, granular endpoint control and end-user freedom, COSMOS is designed to enable organizations to garner the […]
Threats & Malware, Vulnerabilities
August 12, 2022
Via: Help Net SecurityDynatrace has extended its Application Security Module to detect and protect against vulnerabilities in runtime environments, including the Java Virtual Machine (JVM), Node.js runtime, and .NET CLR. In addition, Dynatrace has extended its support to applications running in Go. With […]
Application security, Security
July 6, 2022
Via: Dark ReadingA study out this week shows that global spending on identity and access management (IAM) solutions is on pace to rise by 62% over the next five years. A big chunk of that growth will be built on the back […]
July 1, 2022
Via: Help Net SecuritySkyhigh Security announced it has partnered with Gotara, a global career growth platform for women in STEM+. The program launched internally to Skyhigh Security employees this month and is a key element of the company’s leadership development program. Through the […]