Revelstoke collaborates with Check Point to automate detection and response solutions

Revelstoke announced partnership with Check Point to enhance edge network security, endpoint and XDR with low-code, high-speed automation, and to empower SOC teams to work more accurately and efficiently.... Read more »

Nutanix announces data services for Kubernetes and cross-cloud data mobility

Nutanix announced new capabilities in the Nutanix Cloud Platform to enable customers to integrate data management of containerized and virtualized applications on-premises, on public cloud, and at the edge.... Read more »

Turla’s Snake malware network disrupted by Five Eyes’ agencies

The US Justice Department announced the completion of court-authorized operation MEDUSA, to disrupt a global peer-to-peer network of computers compromised by sophisticated malware, called “Snake” (aka “Uroburous”), that the... Read more »

Never leak secrets to your GitHub repositories again

GitHub is making push protection – a security feature designed to automatically prevent the leaking of secrets to repositories – free for owners of all public repositories. Previously, the... Read more »

SquareX browser-integrated cybersecurity solution keeps consumers online activities safe

SquareX, led by serial cybersecurity entrepreneur Vivek Ramachandran, is developing a browser-based cybersecurity product to keep consumers safe online. The company announced that it has raised USD 6 million... Read more »

Kubernetes Bill of Materials (KBOM) open-source tool enhances cloud security response to CVEs

Kubernetes Security Operations Center (KSOC) released the first-ever Kubernetes Bill of Materials (KBOM) standard. Available in an open-source CLI tool, this KBOM enables cloud security teams to understand the... Read more »

Prevent attackers from using legitimate tools against you

Malicious actors are increasingly exploiting legitimate tools to accomplish their goals, which include disabling security measures, lateral movement, and transferring files. Using commonly available tools allows attackers to evade... Read more »

The security and privacy risks of large language models

A large language model (LLM) is an artificial intelligence (AI) algorithm that employs deep learning methodologies, and extensive data sets to comprehend, condense, create, and predict new content. An... Read more »

56,000+ cloud-based apps at risk of malware exfiltration

The technology sector had the highest number of malware-infected employees, most exposed corporate credentials and the majority of all stolen cookies, according to SpyCloud. Drawing on SpyCloud’s database of... Read more »

Company executives can’t afford to ignore cybersecurity anymore

Asked about the Board and C-Suite‘s understanding of cybersecurity across the organisation, only 39% of respondents think their company’s leadership has a sound understanding of cybersecurity’s role as a... Read more »
Subscribe to our Newsletter