Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Amazon, Microsoft Cloud Leaks Highlight Lingering Misconfiguration Issues

Cloud storage databases, often deployed as "rogue servers" without the blessing of the IT department, continue to put companies and their sensitive data at risk.

DARKReading
#vulnerability#web#microsoft#amazon#perl#auth
How to Close Kubernetes' Network Security Gap

StackRox bridges network security and other gaps and makes applying and managing network isolation and access controls easier while extending Kubernetes' automation and scalability benefit.

Flashpoint Releases Ransomware Prediction Model for Vulnerabilities

Links individual vulnerabilities to those known to have been used in ransomware operations, helping vulnerability management teams prevent potential cyber extortion events with VulnDB.

Rezilion Expands Dynamic SBOM Capability to Support Windows Environments

Technology consolidates Windows and Linux software risk together in one UI, helping teams manage vulnerabilities and comply with new regulatory standards.

Lacework Extends CNAPP Capabilities With Attack Path Analysis and Agentless Workload Scanning

Greater insight into attack paths and runtime visibility helps customers reduce risk and improve cloud security posture.

Understanding the Rise of Risk-Based Vulnerability Management

Risk-based vulnerability management solutions foster the convergence of risk management and vulnerability management. Andrew Braunberg explains what’s driving the emergence of RBVM.

Malicious Python Package Relies on Steganography to Download Malware

The malicious package downloads an image from the Web, then uses a steganography module to extract and execute the code to download malware.

Patch ASAP: Critical Citrix, VMware Bugs Threaten Remote Workspaces With Takeover

Hole-y software alert, Batman: Cybercriminal faves Citrix Gateway and VMware Workspace ONE have authentication-bypass bugs that could offer up total access to attackers.

InterPlanetary File System Increasingly Weaponized for Phishing, Malware Delivery

Cyberattackers like IPFS because it is resilient to content blocking and takedown efforts.

How US Businesses Suffer From the Lack of Personal Data Privacy Laws

The stalling of federal legislation and the continued expansion of data brokers are fueling a phishing epidemic.