Key takeaways from the Open Cybersecurity Schema FormatOne of the most pervasive challenges in the current cybersecurity environment is an overabundance of tooling vendors, all of...
Day: September 9, 2022
Multi-stage crypto-mining malware hides in legitimate apps with month-long delay trigger
Multi-stage crypto-mining malware hides in legitimate apps with month-long delay triggerResearchers have discovered a new multi-stage malware delivery campaign that relies on legitimate application installers distributed...
Nvidia partners with Dell and VMware for faster AI systems
Nvidia partners with Dell and VMware for faster AI systemsNew vSphere paired with Nvidia DPUs will speed up data center performance.Leer másCSO OnlineNew vSphere paired with...
Traceable AI debuts API testing product for its security platform
Traceable AI debuts API testing product for its security platformTraceable AI today announced the general availability of xAST, an API security testing solution, as part of...
Stuxnet explained: The first known cyberweapon
Stuxnet explained: The first known cyberweaponWhat is Stuxnet? Stuxnet is a powerful computer worm designed by U.S. and Israeli intelligence that to disable a key part...
Resolving conflicts between security best practices and compliance mandates
Resolving conflicts between security best practices and compliance mandatesSo, you read a great tip on the internet and think it would improve your security posture. Before...
Women in cybersecurity form non-profit organization The Forte Group
Women in cybersecurity form non-profit organization The Forte GroupA group of over 90 women working in cybersecurity roles have formed The Forte Group, a non-profit organization...
New Vulnerabilities Reported in Baxter’s Internet-Connected Infusion Pumps
New Vulnerabilities Reported in Baxter's Internet-Connected Infusion PumpsMultiple security vulnerabilities have been disclosed in Baxter's internet-connected infusion pumps used by healthcare professionals in clinical environments to...
Hackers Exploit Zero-Day in WordPress BackupBuddy Plugin in ~5 Million Attempts
Hackers Exploit Zero-Day in WordPress BackupBuddy Plugin in ~5 Million AttemptsA zero-day flaw in a WordPress plugin called BackupBuddy is being actively exploited, WordPress security company Wordfence has...
Palo Alto adds new SaaS compliance, threat prevention, URL filtering features to Prisma solution
Palo Alto adds new SaaS compliance, threat prevention, URL filtering features to Prisma solutionCybersecurity vendor Palo Alto Networks has announced new updates to its Prisma Secure...
Intro to MongoDB’s queryable encryption
Intro to MongoDB’s queryable encryptionQueryable encryption was the main attraction at MongoDB World 2022, for understandable reasons. It introduces a unique capability to reduce the attack...
Dashlane launches integrated passkey support for password manager with new in-browser passkey solution
Dashlane launches integrated passkey support for password manager with new in-browser passkey solutionPassword management vendor Dashlane has announced the introduction of integrated passkey support in its...