Ermetic’s new capabilities empower users to detect misconfigurations in Kubernetes

Ermetic revealed that its Cloud Native Application Protection Platform (CNAPP) can now automatically detect and correct misconfigurations, compliance violations, and risky or excessive privileges in Kubernetes clusters for its... Read more »

CISA launches Decider to make MITRE ATT&CK more accessible for network defenders

The Cybersecurity and Infrastructure Security Agency (CISA), in partnership with the Homeland Security Systems Engineering and Development Institute (HSSEDI), has released Decider, a tool for mapping adversary behavior to... Read more »

Rezonate expands coverage to all major identity providers to prevent identity threats

Rezonate has announced its latest native integration with Microsoft Azure AD, Okta, and Google Workspace in addition to existing cloud infrastructure support. These integrations further advance Rezonate’s mission to... Read more »

ThreatHunter.ai FIRST EYES helps organizations mitigate cyber threats

ThreatHunter.ai launched FIRST EYES, a solution intended to aid organizations lacking strong cybersecurity measures in handling possible threats and defending against the increasing frequency of cyber assaults. FIRST EYES... Read more »

MSPAlliance Cyber Verify helps MSPs achieve compliance

MSPAlliance unveiled Cyber Verify, a Compliance-as-a-Service platform that not only facilitates MSPs in achieving compliance but also enables them to offer compliance services to their customers. The platform has... Read more »

Wipro releases 5G Def-i to accelerate connectivity integrations

Wipro has launched its “5G Def-i” platform which empowers businesses to seamlessly transform their infrastructure, networks and services. Many organizations have failed to maximize their return on connectivity investments... Read more »

Attackers increasingly using transfer.sh to host malicious code

For many years now, unsecured internet-facing Redis servers have been steadily getting co-opted by criminals to mine cryptocurrency, so the latest cryptojacking campaign spotted by Cado Labs researcher cannot... Read more »

US government puts cybersecurity at forefront with newly announced National Strategy

The National Cybersecurity Strategy was unveiled today by the Biden-Harris Administration. The Strategy recognizes that government must use all tools of national power in a coordinated manner to protect... Read more »

BlackLotus UEFI bootkit disables Windows security mechanisms

ESET researchers have published the first analysis of a UEFI bootkit capable of circumventing UEFI Secure Boot, a critical platform security feature. The functionality of the bootkit and its... Read more »

Uncovering the most pressing cybersecurity concerns for SMBs

In this Help Net Security video interview, James Edgar, CISO at Fleetcor, discusses what consequences SMBs are most concerned about when it comes to cyberattacks, what technology SMBs are... Read more »
Subscribe to our Newsletter