News

  • Emotet Tops List of July’s Most Widely Used Malware

    PRIVACY PRIVACY The Emotet botnet continues to evolve and now includes a credit card stealer module Read More

    Read More

  • Accelerate Vulnerability Detection and Response for AWS with Tenable Cloud Security Agentless Assessment

    PRIVACY PRIVACY Learn how to leverage our latest cloud security discovery feature, Tenable.cs Agentless Assessment, to enhance the way you can scan for software vulnerabilities and misconfigurations in the cloud. Historically, vulnerability scanning in the cloud has been accomplished by way of using network-based scanners like Nessus or an agent-based approach with Nessus Agents. For…

    Read More

  • Introducing Tenable Cloud Security with Agentless Assessment and Live Results

    PRIVACY PRIVACY Tenable’s latest cloud security enhancements unify cloud security posture and vulnerability management with new, 100% API-driven scanning and zero-day detection capabilities. Tenable has helped thousands of our customers scan and manage vulnerabilities in their cloud infrastructure for years. We accelerated our cloud native application protection (CNAPP) capabilities in 2021 and 2022 with our…

    Read More

  • More Dangers of Cyberbullying Emerge—Our Latest Connected Family Report

    PRIVACY PRIVACY Earlier this year, our global Connected Family Study revealed the online habits of parents and their children. What we found called for a closer look.  One finding that leaped out, in particular, is—cyberbullying occurs far more often than parents think. And in many cases, children are keeping it from their parents.   Now with our…

    Read More

  • CrowdStrike adds AI-powered indicators of attack to Falcon platform

    PRIVACY PRIVACY Cybersecurity vendor CrowdStrike has added new AI-powered indicators of attack (IoA) functionality to its Falcon platform. Announced at the Black Hat USA 2022 Conference, the enhancement leverages AI techniques to create new IoAs at machine speed and scale to help organizations stop emerging attack techniques and enable them to optimize detection and response,…

    Read More

  • Chinese APT group uses multiple backdoors in attacks on military and research organizations

    PRIVACY PRIVACY Since early this year, a known APT group of Chinese origin has been targeting military industrial complex enterprises and public institutions in Ukraine, Russia and Belarus, as well as in other parts of the world like Afghanistan. The group, tracked in the past as TA428, has an interesting approach where it deploys up…

    Read More

  • OPSWAT launches new malware analysis capabilities for ICS, OT networks

    PRIVACY PRIVACY Critical infrastructure cybersecurity vendor OPSWAT has announced new malware analysis capabilities for IT and operational technology (OT). Revealed at the Black Hat USA 2022 Conference, enhancements include OPSWAT Sandbox for OT with detection of malicious communications on OT network protocols and support for open-source third-party tools in OPSWAT’s MetaDefender Malware Analyzer platform, the…

    Read More

  • Predator Pleads Guilty After Targeting Thousands of Girls Online

    PRIVACY PRIVACY West Sussex man blackmailed his victims Read More

    Read More

  • Are cloud containers a sugar-coated threat?

    PRIVACY PRIVACY This blog was written by an independent guest blogger. Containerization is a rapidly evolving technology in cloud-native applications. Just like computing systems, containers consist of packages of software programs with all the vital elements like binaries, files, and libraries for running an application in the environment from anywhere. Containers are lightweight, and DevOps…

    Read More

  • Exploit Activity Surges 150% in Q2 Thanks to Log4Shell

    PRIVACY PRIVACY Malware and botnet detections also soar Read More

    Read More

News, Advisories and much more

Exit mobile version