The Humble Hub
Over the weekend I organized some old computing equipment. I found this beauty in one of my boxes. It’s a Netgear EN104TP hub. I’ve mentioned this device before, in…
Hackers behind Twilio data breach also targeted Cloudflare employees
Cloudflare revealed that at least 76 employees and their family members were targeted by smishing attacks similar to the one that hit Twilio. The content delivery network and DDoS mitigation…
Deepfence ThreatMapper 1.4 empowers organizations to visualize cloud native threat landscape
Today, at Black Hat USA 2022, Deepfence announced the 1.4 release of its open source project ThreatMapper, cloud native offering that expands attack path visualization, adds cloud security posture management,…
Gurucul’s poly-cloud and multi-cloud offering accelerates security teams’ ability to mitigate threats
In Las Vegas, at Black Hat USA 2022, Gurucul announced advanced Poly-Cloud architecture support, enhanced multi-cloud deployments, and cross-cloud detection and response across all common cloud stacks including Amazon Web…
Veracode platform enhancements improve developers’ ability to secure software supply chains
At Black Hat USA 2022, Veracode announced the enhancement of its Continuous Software Security Platform with substantial improvements to its integrated developer experience. New features include extended integrations to support…
NetSPI unveils two open-source tools to assist defence teams in uncovering vulnerable network shares
At Black Hat USA 2022, NetSPI has unveiled two new open-source tools for the information security community: PowerHuntShares and PowerHunt. These new adversary simulation tools were developed by NetSPI’s Senior…
Cycode’s new software supply chain features identify vulnerabilities in all phases of the SDLC
Cycode has launched its software composition analysis (SCA) solution and the expansion of its platform to add static application security testing (SAST) and container scanning. Cycode’s platform makes AppSec tools…
Emotet Tops List of July’s Most Widely Used Malware
The Emotet botnet continues to evolve and now includes a credit card stealer module
Microsoft urges Windows users to run patch for DogWalk zero-day exploit
Despite previously claiming the DogWalk vulnerability did not constitute a security issue, Microsoft has now released a patch to stop attackers from actively exploiting the vulnerability.
Experts Uncover Details on Maui Ransomware Attack by North Korean Hackers
The first ever incident possibly involving the ransomware family known as Maui occurred on April 15, 2021, aimed at an unnamed Japanese housing company. The disclosure from Kaspersky arrives a…