Week in review: Citrix and Fortinet RCEs, Microsoft fixes exploited zero-dayHere’s an overview of some of last week’s most interesting news, articles, interviews and videos: Vulnerability...
Day: December 19, 2022
Action1 platform upgrades enable organizations to mitigate security and non-compliance risks
Action1 platform upgrades enable organizations to mitigate security and non-compliance risksAction1 released the new version of its solution, helping internal IT departments and managed service providers...
Anomali unveils new solutions and capabilities to strengthen cyber resiliency for users
Anomali unveils new solutions and capabilities to strengthen cyber resiliency for usersAnomali unveiled new capabilities to extend an organization’s visibility across their entire internal and external...
Axonius boosts SaaS management solution with new capabilities
Axonius boosts SaaS management solution with new capabilitiesAxonius releases two new capabilities within Axonius SaaS Management to help organizations better understand their overall SaaS application risk....
Armorblox Custom Role-Based Access Controls protects sensitive data
Armorblox Custom Role-Based Access Controls protects sensitive dataArmorblox announced the addition of Custom Role-Based Access Controls to its cloud-delivered email security platform to maintain data compliance...
5 cybersecurity trends accelerating in 2023
5 cybersecurity trends accelerating in 2023Netwrix has released key cybersecurity trends that will affect organizations of all sizes in 2023. Here are five specific trends that...
85% of attacks now use encrypted channels
85% of attacks now use encrypted channelsMalware continues to pose the greatest threat to individuals and businesses across nine key industries, with manufacturing, education and healthcare...
What happens once scammers receive funds from their victims
What happens once scammers receive funds from their victimsIn this Help Net Security video, Ronnie Tokazowski, Principal Threat Advisor at Cofense, offers insight into the world’s...
Cybersecurity Experts Uncover Inner Workings of Destructive Azov Ransomware
Cybersecurity Experts Uncover Inner Workings of Destructive Azov RansomwareCybersecurity researchers have published the inner workings of a new wiper called Azov Ransomware that's deliberately designed to corrupt data...
Serious Attacks Could Have Been Staged Through This Amazon ECR Public Gallery Vulnerability
Serious Attacks Could Have Been Staged Through This Amazon ECR Public Gallery VulnerabilityA critical security flaw has been disclosed in Amazon Elastic Container Registry (ECR) Public...
Google Launches OSV-Scanner Tool to Identify Open Source Vulnerabilities
Google Launches OSV-Scanner Tool to Identify Open Source VulnerabilitiesGoogle on Tuesday announced the open source availability of OSV-Scanner, a scanner that aims to offer easy access to...
Cisco Firepower Management Center and Firepower Threat Defense Software SSH Denial of Service Vulnerability
Cisco Firepower Management Center and Firepower Threat Defense Software SSH Denial of Service VulnerabilityA vulnerability in the processing of SSH connections of Cisco Firepower Management Center...