News

Organizations lack the skills and headcount to manage Kubernetes

Organizations lack the skills and headcount to manage Kubernetes 10/11/2023 at 07:02 By Help Net Security The Kubernetes industry is undergoing rapid change and evolution due to the growth of edge computing, the acceleration of AI, and the pressing need to modernize Kubernetes management in response to increasing technology scale and complexity, according to Spectro […]

React to this headline:

Loading spinner

Organizations lack the skills and headcount to manage Kubernetes Read More »

Sandworm hackers incapacitated Ukrainian power grid amid missile strike

Sandworm hackers incapacitated Ukrainian power grid amid missile strike 09/11/2023 at 19:17 By Helga Labus Russia-backed ATP group Sandworm is behind the cyberattack that caused disruption of parts of the Ukrainian power grid in late 2022, according to Mandiant. About Sandworm “Sandworm is a threat actor that has carried out cyber operations in support of

React to this headline:

Loading spinner

Sandworm hackers incapacitated Ukrainian power grid amid missile strike Read More »

MOVEit hackers leverage new zero-day bug to breach organizations (CVE-2023-47246)

MOVEit hackers leverage new zero-day bug to breach organizations (CVE-2023-47246) 09/11/2023 at 18:01 By Helga Labus A critical zero-day vulnerability (CVE-2023-47246) in the SysAid IT support and management software solution is being exploited by Lace Tempest, a ransomware affiliate known for deploying Cl0p ransomware. Lace Tempest has previously exploited zero-day vulnerability (CVE-2023-34362) in Progress Software’s

React to this headline:

Loading spinner

MOVEit hackers leverage new zero-day bug to breach organizations (CVE-2023-47246) Read More »

Open-source vulnerability disclosure: Exploitable weak spots

Open-source vulnerability disclosure: Exploitable weak spots 09/11/2023 at 15:17 By Zeljka Zorz Flaws in the vulnerability disclosure process of open-source projects could be exploited by attackers to harvest the information needed to launch attacks before patches are made available, Aqua Security researchers worry. The risk arises from “half-day” and “0.75-day” vulnerabilities “Half-day” vulnerabilities are known

React to this headline:

Loading spinner

Open-source vulnerability disclosure: Exploitable weak spots Read More »

Security in the impending age of quantum computers

Security in the impending age of quantum computers 09/11/2023 at 09:02 By Help Net Security Quantum computing is poised to be one of the most important technologies of the 21st century. With global governments having collectively pledged more than $38 billion in public funds for quantum technologies and $2.1 billion of new private capital flowing

React to this headline:

Loading spinner

Security in the impending age of quantum computers Read More »

Most cybersecurity investments aren’t used to their full advantage

Most cybersecurity investments aren’t used to their full advantage 09/11/2023 at 07:31 By Help Net Security While organizations are slashing budgets across other departments, IT and security budgets are growing to address evolving IT infrastructure and rising threats from new tactics such as AI-based attacks, according to Axonius. Budget growth in IT and security In

React to this headline:

Loading spinner

Most cybersecurity investments aren’t used to their full advantage Read More »

Tech leaders struggle to keep up with AI advances

Tech leaders struggle to keep up with AI advances 09/11/2023 at 07:01 By Help Net Security New data reveals artificial intelligence is challenging organizations in significant ways, with only 15% of global tech leaders reporting they are prepared for the demands of generative AI and 88% saying stronger regulation of AI is essential, according to

React to this headline:

Loading spinner

Tech leaders struggle to keep up with AI advances Read More »

Product showcase: Red Piranha’s security first, single vendor SASE, collaboration with Intel

Product showcase: Red Piranha’s security first, single vendor SASE, collaboration with Intel 09/11/2023 at 07:01 By Help Net Security Red Piranha has released the latest Crystal Eye consolidated security platform officially in global collaboration with Intel on the 12th of October and more details on the Network Builders Panel with Intel later that month. Crystal

React to this headline:

Loading spinner

Product showcase: Red Piranha’s security first, single vendor SASE, collaboration with Intel Read More »

Sumo Logic discloses potential breach via compromised AWS credential

Sumo Logic discloses potential breach via compromised AWS credential 08/11/2023 at 14:49 By Helga Labus Cloud-native big data and security analytics firm Sumo Logic is investigating a potential security incident within their platform, the company revealed on Tuesday. The Sumo Logic incident “On Friday, November 3rd, 2023, Sumo Logic discovered evidence of a potential security

React to this headline:

Loading spinner

Sumo Logic discloses potential breach via compromised AWS credential Read More »

Marina Bay Sands breach exposed data of 665,000 customers

Marina Bay Sands breach exposed data of 665,000 customers 08/11/2023 at 12:31 By Helga Labus Singapore-based luxury resort and casino Marina Bay Sands has suffered a data breach that exposed data of 665,000 non-casino rewards program members. The Marina Bay Sands data breach “Marina Bay Sands became aware of a data security incident on 20

React to this headline:

Loading spinner

Marina Bay Sands breach exposed data of 665,000 customers Read More »

The 3 key stages of ransomware attacks and useful indicators of compromise

The 3 key stages of ransomware attacks and useful indicators of compromise 08/11/2023 at 09:02 By Help Net Security For SOC teams to be able to defend their organization against ransomware attacks, they need to have the right security toolset, but also an understanding of the three primary ransomware attack stages. In this article, we

React to this headline:

Loading spinner

The 3 key stages of ransomware attacks and useful indicators of compromise Read More »

Aqua Trivy open-source security scanner now finds Kubernetes security risks

Aqua Trivy open-source security scanner now finds Kubernetes security risks 08/11/2023 at 08:31 By Mirko Zorz The Aqua Trivy open-source scanner now supports vulnerability scanning for Kubernetes components and Kubernetes Bill of Materials (KBOM) generation. Now, companies can better understand the components within their Kubernetes environment and how secure they are to reduce risk. “Aqua

React to this headline:

Loading spinner

Aqua Trivy open-source security scanner now finds Kubernetes security risks Read More »

Companies have good reasons to be concerned about generative AI

Companies have good reasons to be concerned about generative AI 08/11/2023 at 07:32 By Help Net Security Companies need help to get visibility into the operations of their AI programs, potentially reducing productivity while creating significant risks around governance, data security, and more, according to Portal26. Two-thirds of respondents admitted to a Generative AI security

React to this headline:

Loading spinner

Companies have good reasons to be concerned about generative AI Read More »

Uphold Linux systems’ performance and availability in Azure

Uphold Linux systems’ performance and availability in Azure 08/11/2023 at 07:01 By Help Net Security Cloud computing carries many benefits for your business… as long as you can ensure the performance and availability of your cloud environments. Let’s take the following three cloud computing benefits as examples. Rapidly scale cloud services: In the absence of

React to this headline:

Loading spinner

Uphold Linux systems’ performance and availability in Azure Read More »

Oracle Employee Helped Cocaine Dealers Hide $54 Million In Crypto, DOJ Says

Oracle Employee Helped Cocaine Dealers Hide $54 Million In Crypto, DOJ Says 07/11/2023 at 19:35 By Thomas Brewster, Forbes Staff A long-time Oracle engineer was allegedly hiding crypto for imprisoned cocaine dealers who were shifting millions of dollars every month, the DOJ says. One of the dealers protests that the crypto was legitimately acquired. This

React to this headline:

Loading spinner

Oracle Employee Helped Cocaine Dealers Hide $54 Million In Crypto, DOJ Says Read More »

Microsoft introduces new access policies in Entra to boost MFA usage

Microsoft introduces new access policies in Entra to boost MFA usage 07/11/2023 at 18:17 By Helga Labus As part of a broader initiative to strengthen security, Microsoft is rolling out Microsoft-managed Conditional Access policies in Entra ID (formerly Azure Active Directory) to increase the use of multifactor authentication (MFA) for enterprise accounts. Microsoft Entra Conditional

React to this headline:

Loading spinner

Microsoft introduces new access policies in Entra to boost MFA usage Read More »

Looney Tunables bug exploited for cryptojacking

Looney Tunables bug exploited for cryptojacking 07/11/2023 at 12:46 By Helga Labus Kinsing threat actors have been spotted exploiting the recently disclosed Looney Tunables (CVE-2023-4911) vulnerability to covertly install cryptomining software into cloud-native environments. Kinsing (aka Money Libra) is a threat actor group that has been active since late 2021, targeting cloud-native environments and applications

React to this headline:

Loading spinner

Looney Tunables bug exploited for cryptojacking Read More »

7 free cyber threat maps showing attack intensity and frequency

7 free cyber threat maps showing attack intensity and frequency 07/11/2023 at 09:03 By Help Net Security Cyber threat maps are one of the most visually engaging tools in the arsenal of cybersecurity professionals. These real-time visualizations provide a global perspective on digital threats, showcasing the intensity and frequency of attacks as they happen. This

React to this headline:

Loading spinner

7 free cyber threat maps showing attack intensity and frequency Read More »

Kubescape 3.0 elevates open-source Kubernetes security

Kubescape 3.0 elevates open-source Kubernetes security 07/11/2023 at 08:32 By Help Net Security Targeted at the DevSecOps practitioner or platform engineer, Kubescape, the open-source Kubernetes security platform has reached version 3.0. Vulnerability scan results Kubescape 3.0 features Kubescape 3.0 adds new features that make it easier for organizations to secure their Kubernetes clusters, including: Compliance

React to this headline:

Loading spinner

Kubescape 3.0 elevates open-source Kubernetes security Read More »

Buy Me A Coffee
Thank you for visiting!