SUSE released Rancher Prime 2.0, enhancing customers’ ability to manage heterogeneous, multi-cloud Kubernetes deployments securely and at scale. SUSE also revealed updates to Rancher community edition, SLE Micro 5.5 and the future of SUSE Edge. The latest updates continue to…
Category: Help Net Security
Sumo Logic discloses potential breach via compromised AWS credential
Cloud-native big data and security analytics firm Sumo Logic is investigating a potential security incident within their platform, the company revealed on Tuesday. The Sumo Logic incident “On Friday, November 3rd, 2023, Sumo Logic discovered evidence of a potential security…
LastPass and Acronis join forces to strenghten password protection for MSPs
LastPass and Acronis announced a partnership to provide password management integration for managed service providers (MSPs) using Acronis Cyber Protect Cloud, an all-in-one data and cybersecurity protection platform. The integration, accessible from the Acronis Cyber Protect Cloud marketplace, will enable…
Marina Bay Sands breach exposed data of 665,000 customers
Singapore-based luxury resort and casino Marina Bay Sands has suffered a data breach that exposed data of 665,000 non-casino rewards program members. The Marina Bay Sands data breach “Marina Bay Sands became aware of a data security incident on 20…
The 3 key stages of ransomware attacks and useful indicators of compromise
For SOC teams to be able to defend their organization against ransomware attacks, they need to have the right security toolset, but also an understanding of the three primary ransomware attack stages. In this article, we will dive into those…
Aqua Trivy open-source security scanner now finds Kubernetes security risks
The Aqua Trivy open-source scanner now supports vulnerability scanning for Kubernetes components and Kubernetes Bill of Materials (KBOM) generation. Now, companies can better understand the components within their Kubernetes environment and how secure they are to reduce risk. “Aqua Trivy…
AI-assisted coding and its impact on developers
The emergence of AI has put into question the roles of software developers everywhere. In this Help Net Security video, Cat Hicks, VP of Research Insights at Pluralsight, discusses pressing questions that engineering organizations face regarding the rapidly-changing possibilities of…
Companies have good reasons to be concerned about generative AI
Companies need help to get visibility into the operations of their AI programs, potentially reducing productivity while creating significant risks around governance, data security, and more, according to Portal26. Two-thirds of respondents admitted to a Generative AI security or misuse…
Uphold Linux systems’ performance and availability in Azure
Cloud computing carries many benefits for your business… as long as you can ensure the performance and availability of your cloud environments. Let’s take the following three cloud computing benefits as examples. Rapidly scale cloud services: In the absence of…
Uptycs provides unified supply chain and runtime security for Kubernetes
Uptycs has unveiled new automated code and runtime protections to help security and development teams align on policies, enforce them anywhere, and define remediation workflows — all from a single console. DevSecOps teams can now automate shift-left security controls using…
Bitwarden launches passkey management for passwordless authentication across accounts
Bitwarden has launched passkey management, enabling every user to create, manage, and store passkeys in their vaults. Users can now quickly and securely log into passkey-enabled websites through the Bitwarden web extension. The synchronized passkeys are encrypted in users’ vaults…
Varonis enhances its Microsoft 365 offering to prevent sensitive email exposure
Varonis announced major enhancements to its Microsoft 365 offering, adding more robust capabilities to continuously detect and prevent exposures in the world’s top cloud-based email service. With this release, Varonis extends its patented data classification technology to email messages, attachments,…
NETSCOUT releases Adaptive DDoS Protection for AED
NETSCOUT launched Adaptive DDoS Protection for Arbor Edge Defense (AED) to protect ISPs and enterprises from DNS water torture attacks. According to the NETSCOUT DDoS Threat Intelligence Report, Domain Name System (DNS) water torture attacks increased 353% in the first…
IRONSCALES expands platform capabilities to improve employee phishing awareness
IRONSCALES announced its Fall ’23 Release, strengthening its foundational behavioral analysis with deep image-based detection capabilities to stop email attacks that bypass text analysis such as QR code phishing attacks (or quishing). Additionally, IRONSCALES released phishing simulation testing enhancements with…
Kentik Kube collects metadata across Kubernetes pods, clusters, and services
Kentik, the network observability company, has released Kentik Kube, a solution that reveals how Kubernetes traffic routes through organizations’ data centers, clouds, and the internet. Kentik Kube gives network, cloud, and infrastructure engineers detailed network traffic and performance visibility, both…
Sumo Logic launches HELM Chart V4 to unify data collection on Kubernetes clusters
Sumo Logic has launched its HELM Chart V4 feature to fully unify data collection as part of its continued commitment to OpenTelemetry (OTel). Organizations can now package, configure and deploy applications and services on Kubernetes clusters with OpenTelemetry as a…
Microsoft introduces new access policies in Entra to boost MFA usage
As part of a broader initiative to strengthen security, Microsoft is rolling out Microsoft-managed Conditional Access policies in Entra ID (formerly Azure Active Directory) to increase the use of multifactor authentication (MFA) for enterprise accounts. Microsoft Entra Conditional Access policies…
Traefik Hub updates modernize API runtime operations
Traefik Labs added new capabilities to Traefik Hub, a Kubernetes native and GitOps-driven Application Programming Interface (API) management solution. This latest update modernizes API runtime operations for platform teams who frequently encounter change management and incident management challenges. “Today, APIs…
Malwarebytes ThreatDown helps organizations to overpower threats
Malwarebytes launched ThreatDown, the product family that protects IT-constrained organizations with effective, easy-to-use cybersecurity. Formerly named Malwarebytes for Business, ThreatDown solutions are purpose-built to overpower threats, while empowering IT, through easy-to-use, effective technologies like the new Security Advisor dashboard and…
ExtremeCloud Universal ZTNA strengthens network security
Extreme Networks introduced ExtremeCloud Universal Zero Trust Network Access (ZTNA). Offered as a subscription service for ExtremeCloud customers, Universal ZTNA is a network security offering to integrate network, application, and device access security within a single solution. With unified observability,…