Advertisement

cloud security

Aryaka rolls out cloud-based web gateway for SASE-focused WAN offering

Aryaka's Secure Web Gateway and Firewall-as-a-Service adds cloud-based security services to its Zero Trust WAN platform, as it moves toward providing SASE capabilities for its users.


cloud security

Tenable aims to unify your cybersecurity with exposure management platform

Tenable tackles the issue of siloed security apps with a cloud-based exposure management system that pulls in data from diverse types of systems that track a company’s digital assets and identify vulnerabilities.


Dell Active Pen

Dell launches new cybersecurity resources to enhance zero-trust adoption, cyber resilience

Dell announces several new cybersecurity resources including a Zero Trust Center of Excellence that will incorporate the US Department of Defense Zero Trust Reference Architecture.


Advertisement

U.S. dollar sign circuitry.

New US DHS grant program can boost local governments’ cybersecurity strength

The cybersecurity grant program is designed to initiate state and local governments projects but does not provide ongoing operating funds.


2 man with binoculars data breach research spy

8 strange ways employees can (accidently) expose data

From eyeglass reflections and new job postings to certificate transparency logs and discarded printers, employees have odd ways to unintentionally expose data..


Microsoft  >  RDP | Remote Desktop Protocol vulnerabilities  >  caution / danger / admin login

Microsoft mitigation for new Exchange Server zero-day exploits can be bypassed

No permanent fix for the Exchange Server vulnerabilities is yet available, but other steps can mitigate the risk.


A user reviews data and statistical models. [analytics / analysis / tracking / monitoring / logging]

LiveAction adds new SOC-focused features to ThreatEye NDR platform

A SOC-specific user interface that supports analyst workflows and enhanced predicative threat intelligence capabilities are among the new features.


Digital bugs amid binary code. [security threats / malware / breach / hack / attack]

11 old software bugs that took way too long to squash

As these examples show, vulnerabilities can lurk within production code for years or decades—and attacks can come at any time.


backdoor / abstract security circuits, locks and data blocks

Cyberespionage group developed backdoors tailored for VMware ESXi hypervisors

A possibly new threat actor packaged and deployed backdoors as vSphere Installation Bundles, gaining remote code execution and persistence capabilities.


teamwork / developers / programmers / collaboration / conversation, discussion, gesturing

Enterprises embrace devsecops practices against supply chain attacks

Healthy developer-team culture and adherence to devsecops best practices to protect against supply chain attacks are surprisingly commonplace in today’s security environment, according to a report from Google Cloud's DORA research...


Advertisement

big data merger and acquisition big business smb

Top cybersecurity M&A deals for 2022

The hot cybersecurity mergers and acquisition market continues into 2022 as vendors look to solidify their positions and expand their offerings.


cso security malware breach hack alert gettyimages 1144604134 by solarseven 2400x1600px

Malware builder uses fresh tactics to hit victims with Agent Tesla RAT

A new malware campaign uses the recently discovered Quantum Builder and sophisticated tactics to deliver malicious payload.


Security threat [illustration]  >  A hacker with black hat, mask, and crowbar breaks into a laptop.

Most hackers need 5 hours or less to break into enterprise environments

A new survey of 300 ethical hackers provides insight into not only the most common means of initial access but how a complete end-to-end attack happens.


eliminate insider threats 1

Recent cases highlight need for insider threat awareness and action

Insider threats can have a devastating impact even if the harm is unintentional. Here's advice to identify and mitigate insider threat risk.


international flags / global business discussion

22 notable government cybersecurity initiatives in 2022

Countries across the globe are taking on cybersecurity threats. Here are the most notable initiatives they've introduced in 2022.