Ivanti fixed a maximum severity flaw in its Endpoint Management software (EPM)

Ivanti fixed a maximum severity flaw in its Endpoint Management software (EPM) that can let attackers achieve remote code execution on the core server Ivanti Endpoint Management (EPM) software... Read more »

Trellix strengthens email security with DLP capabilities

Trellix announced Trellix Email Security Cloud with integrated Trellix Data Loss Prevention (DLP) capabilities, available globally. The enhanced solution uniquely improves data security and protects organizations’ sensitive information by... Read more »

Saviynt Intelligence delivers identity security analytics through ML and AI capabilities

Saviynt announced the release of its Intelligence Suite with general availability of Intelligent Recommendations, which will provide customers with dynamic roles, access recommendations, actionable insights, and a multi-dimensional weighted... Read more »

P0 Security raises $15 million to govern and secure cloud access for all identities

P0 Security announced the closing of its $15 million Series A round, bringing its total raised since inception to $20 million. The investment was led by SYN Ventures with... Read more »

Microsoft Patch Tuesday security updates for September 2024 addressed four actively exploited zero-days

Microsoft Patch Tuesday security updates for September 2024 addressed 79 flaws, including four actively exploited zero-day flaws. Microsoft Patch Tuesday security updates for September 2024 addressed 79 vulnerabilities in... Read more »

September Patch Tuesday: Update before 1 October

Read more »

Cybersecurity is a fundamental component of patient care and safety

Healthcare institutions are custodians of vast repositories of sensitive patient data, encompassing comprehensive health histories, insurance profiles, and billing data. The ramifications of a data breach often extend far... Read more »

DockerSpy: Search for images on Docker Hub, extract sensitive information

DockerSpy scans Docker Hub for images and retrieves sensitive information, including authentication secrets, private keys, and other confidential data. “DockerSpy was created to address the growing concern of sensitive... Read more »

ICO and NCA sign MoU to provide joint support for cyber crime victims

Read more »

How AI and zero trust are transforming resilience strategies

In this Help Net Security interview, John Hernandez, President and General Manager at Quest Software, shares practical advice for enhancing cybersecurity resilience against advanced threats. He underscores the need... Read more »
Subscribe to our Newsletter