The root cause of open-source risk

2023 saw twice as many software supply chain attacks as 2019-2022 combined. Sonatype logged 245,032 malicious packages in 2023. One in eight open-source downloads today poses known and avoidable... Read more »

Backdoored Android phones, TVs used for ad fraud – and worse!

A key monetization mechanism of a sophisticated series of cybercriminal operations involving backdoored off-brand mobile and CTV Android devices has been disrupted, Human Security has announced. The company’s Satori... Read more »

AppViewX KUBE+ secures containerized workloads and Kubernetes infrastructure

AppViewX launched AppViewX KUBE+, a comprehensive automated certificate lifecycle management solution for Kubernetes environments that prevents outages and reduces security vulnerabilities. By providing complete certificate visibility, end-to-end automation and... Read more »

Yubico FIDO Pre-reg provides passwordless onboarding and account recovery

Yubico announced the initial availability of FIDO Pre-reg, a capability that delivers secure and seamless passwordless onboarding and account recovery/reset from day one at scale for enterprises. Available exclusively... Read more »

Nutanix strenghtens cyber resilience with ransomware detection and recovery features

Nutanix announced new features in the Nutanix Cloud Platform to strengthen organizations’ cyber resilience against ransomware attacks on unstructured data. These new features, available in Nutanix Data Lens and... Read more »

Identity Threat Protection with Okta AI combats identity-based attacks

Okta announced Identity Threat Protection with Okta AI (Identity Threat Protection), a new product for Okta Workforce Identity Cloud that delivers real-time detection and response for identity-based threats. Built... Read more »

Qualcomm patches 3 actively exploited zero-days

Qualcomm has fixed three actively exploited vulnerabilities (CVE-2023-33106, CVE-2023-33107, CVE-2023-33063) in its Adreno GPU and Compute DSP drivers. Vulnerabilities exploited in Qualcomm GPU and DSP drivers The US-based semiconductor... Read more »

Azul Code Inventory identifies dead and unused source code for removal

Azul announced Code Inventory, a new feature of Azul Vulnerability Detection that provides developers and DevOps teams a precise catalog of the source code actually used in production by... Read more »

Cloaked’s privacy app and web-based platform put people in control of their personal data

Cloaked has launched its privacy app and web-based platform that gives people control of their personal data by creating unlimited, secure identities, including working phone numbers, emails, usernames and... Read more »

Elevate Security Adaptive Trust helps security teams triage and prioritize security events

Elevate Security announced Adaptive Trust solution, enabling Microsoft customers deeper insight into high risk workers who are frequently targeted by attackers and enabling defenders to take action on these... Read more »
Subscribe to our Newsletter