Top

Category: Security


Network security, Security

A Controversial Tool Calls Out Vulnerabilities Across the Web

July 27, 2021

Via: Wired

THE WEB HAS long been a playground for hackers, offering up hundreds of millions of public-facing servers to comb through for basic vulnerabilities to exploit. Now one hacker tool is about to take that practice to its logical, extreme conclusion: […]


Access control, Security

Consumer attitudes towards various digital identity authentication methods

July 27, 2021

Via: Help Net Security

With concerns around online fraud and identity theft rising, consumers expect businesses to utilize new technologies to protect them online. According to research from Trulioo, 84% of people believe that businesses will need to rely more on automated fraud protection […]


Network security, Security

Product showcase: ManageEngine Vulnerability Manager Plus

July 27, 2021

Via: Help Net Security

Software and hardware vulnerabilities are an ever-present threat to every enterprise. In response to the tedious and time-consuming processes often associated with traditional vulnerability management, enterprise IT administrators have started looking for better alternatives that can integrate with their existing […]


Cloud security, Security

36% of organizations suffered a serious cloud security data leak or a breach in the past year

July 27, 2021

Via: Help Net Security

As cloud adoption accelerates and the scale of cloud environments grows, engineering and security teams say that risks—and the costs of addressing them—are increasing. The findings are part of the State of Cloud Security 2021 survey conducted by Fugue and […]


Network security, Security

Windows “PetitPotam” network attack – how to protect against it

July 26, 2021

Via: Naked Security

French researcher Gilles Lionel, who goes by @topotam77, recently published proof-of-concept code that attackers could use to take over a Windows network. The hack, which he has dubbed PetitPotam (which is a nod to the endangered Pygmy Hippopotamus, as far […]


Network security, Security

Norton Security UWP app helps protect Lenovo laptop PCs from hackers and online scams

July 26, 2021

Via: Help Net Security

NortonLifeLock announced that the Norton Security Universal Windows Platform (UWP) app will be pre-installed on select new Lenovo laptop PCs. Expanding its collaboration of more than two decades, NortonLifeLock will help protect Lenovo’s always-on, always-connected laptops, including the Yoga 5G […]


Privacy protection, Security

Data-localization policies are spreading rapidly around the world

July 26, 2021

Via: Help Net Security

The global economy increasingly depends on data flowing freely across borders, yet the number of nations with regulatory barriers preventing that from happening has nearly doubled in four years—from 35 countries in 2017 to 62 now, according to a new […]


Cloud security, Security

The knowledge gap around runtime security and the associated risks

July 26, 2021

Via: Help Net Security

According to Aqua Security’s 2021 Cloud Native Security Practitioner study, only 3% recognize that a container, in and of itself, is not a security boundary, indicating that the default security capabilities of containers are overestimated. This result is especially alarming […]


Application security, Security

Wake up! Identify API Vulnerabilities Proactively, From Code Back to Production

July 23, 2021

Via: The Hacker News

After more than 20 years in the making, now it’s official: APIs are everywhere. In a 2021 survey, 73% of enterprises reported that they already publish more than 50 APIs, and this number is constantly growing. APIs have crucial roles […]


Network security, Security

Manufacturers turning to zero trust to better secure their networks

July 23, 2021

Via: Help Net Security

In response to the 62% global increase in ransomware since 2019 (158% increase in North America) and over 40% of manufacturing firms suffering a cyberattack last year, Onclave Networks recommends manufacturers adopt zero trust architecture and security guidelines as supported […]