Security Software

Security | News, how-tos, features, reviews, and videos

Wired brain illustration - next step to artificial intelligence
cybersecurity eye with binary face recognition abstract eye

1887170134 attack surface programming abstract

9 attack surface discovery and management tools

The main goal of cyber asset attack surface management tools is to protect information about a company’s security measures from attackers. Here are 9 tools to consider when deciding what is best for the business.

hand at keyboard with Windows logo

Two Patch Tuesday flaws you should fix right now

Vulnerabilities affecting both Outlook for Windows and Microsoft SmartScreen were patched recently — both could have wide-ranging impact.

shutterstock 1858812901 red team cyberspace red background

Why red team exercises for AI should be on a CISO's radar

As AI increasingly becomes part of systems under development, CISOs need to start considering the cyber risks that may originate from such systems and treat it like any traditional application, including running red team exercises.

dell

Dell beefs up security portfolio with new threat detection and recovery tools

Dell Technologies has added improved MDR capabilities, cloud-based component verification, and a new cyber recovery solution along with a partnered threat management offering.

hacker laptop digits computer screen cyber crime cyber crime theft money digital

DNS data shows one in 10 organizations have malware traffic on their networks

Akamai report highlights how widespread malware threats remain, noting the dangers of threats specific to DNS infrastructure.

corporate security insider threat hacker spy cybersecurity human resources

Akamai releases new threat hunting tool backed by Guardicore capabilities

Akamai Hunt combines the company’s historic DNS, WAF, and DDoS data with Guardicore’s segmentation and telemetry to detect and eliminate evasive threats.

cybercrime cyber crime skull symbol project darknet dark web internet safety cyberattack theft viru

Microsoft tells Exchange admins to revert previously recommended antivirus exclusions

The antivirus exclusion might cause Exchange Server failures or prevent the detection of backdoors planted by attackers.

neon skull sign / danger / caution / threat

Darktrace launches AI-driven vulnerability detection, alert system Newsroom

Newsroom uses AI-assisted knowledge of a customer’s external attack surface to measure exposure to detected vulnerabilities and provides a summary of exploits, affected software and assets.

5 top threats from 2022 most likely to strike in 2023

Study and prepare for these five threats and you will be well on your way to protecting your network, assets, and employees.

shutterstock 2253522551 darknet darkweb

10 dark web monitoring tools

Enterprises looking to get ahead of data breaches and data leaks can benefit from using dark web monitoring tools and scan for personally identifiable information and even respond to attacks. Here is a list of 10 such tools.

neon skull sign / danger / caution / threat

Open Systems launches Ontinue MDR division, new MXDR service Ontinue ION

Ontinue ION promises faster detection and response, deeper understanding of customer’s environments, and the ability to maximize Microsoft security investments.

kubernetes

Expel announces MDR for Kubernetes with MITRE ATT&CK framework alignment

Expel MDR for Kubernetes addresses three core layers of Kubernetes applications: configuration, control panel, and run-time security.

A magnifying lens exposes an exploit amid binary code.

Remote code execution exploit chain available for VMware vRealize Log Insight

Researchers found four vulnerabilities in vRealize Log Insight that were relatively non-threatening on their own but lead to significant compromise when used together.

Patch + update options  >  Pixelized tools + refresh symbol with branching paths

9 API security tools on the frontlines of cybersecurity

Top API security tools can help hold the line against modern threats to the important and ubiquitous software development interfaces.

security vulnerabilities such as hackers and cyberattacks

ServiceNow to detect open source security vulnerabilities with Snyk integration

ServiceNow Vulnerability Response users will now have access to Snyk’s product that scans open source code during the development process.

Digital fingerprints are virtually connected. [tracking / identity / genetics / data privacy]

Nvidia targets insider attacks with digital fingerprinting technology

A new AI-based system from Nvidia sniffs out unusual behavior and ties it to users, in an effort to prevent insider attacks and protect digital credentials.

Targeting user behavior.

Trustwave relaunches Advanced Continual Threat Hunting with human-led methodology

Cybersecurity vendor says enhancement allows for increased human-led threat hunting to uncover more behavior-based findings associated with specific threat actors.

help desk / call center / support network

Perception Point launches Advanced Threat Protection for Zendesk

Perception Point says new platform has been built to help protect vulnerable help desks and customer support teams from external threats such as malicious content within tickets.

Load More
You Might Also Like