The vulnerability that allowed a German journalist to discover links to video conference meetings held by Bundeswehr (the German armed forces) and the Social Democratic Party of Germany (SPD)... Read more »
Kali Linux 2024.2 is now available. It includes future package compatibility for 32-bit platforms, improvements to GNOME 46 and Xfce, and 18 new tools. Desktop changes Kali 2024.2 introduces... Read more »
The observability suite is the first major overhaul for Splunk products since the Cisco acquisition. Plus, Mistral AI makes a deal with Cisco’s incubator. Read more »
Zoho Corporation announced new safeguards to its reinforced, tightly integrated security tech stack. Comprised of four solutions—Ulaa, Zoho Directory, Zoho OneAuth, and Zoho Vault—Zoho’s security stack provides businesses the... Read more »
Cisco addressed vulnerabilities that were exploited to compromise the Webex meetings of the German government. In early May, German media outlet Zeit Online revealed that threat actors exploited vulnerabilities... Read more »
Tines announced its first native AI features: Automatic Mode and AI Action. Customers are already experiencing a significant impact from these two new AI capabilities within the Tines platform... Read more »
Otterize rolls out a major expansion of its Cloud Security Suite, featuring the new Blast Radius Analysis & Remediation tool. This feature, designed to detect exposed infrastructure across different... Read more »
Netskope has unveiled SaaS security enhancements to Netskope One, its cloud-native platform that offers converged security and networking services to enable SASE and zero trust transformation. These new enhancements... Read more »
Infosecurity Europe is taking place at ExCel London from 4-6 June 2024. Help Net Security is on-site. This gallery takes you inside the event. The featured vendors are: Plainsea,... Read more »
Intel 471 launched the company’s 471 Attack Surface Protection solution, an attack surface management (ASM) tool that provides its customers visibility into their external threat landscape and drives a... Read more »