Keeper Security and Ingram Micro expand partnership

 Keeper Security, a leading provider of zero-trust and zero-knowledge cybersecurity software, has announced the expansion of its relationship with global distributor Ingram Micro in European markets. Having announced the initial relationship in November 2023, the expanded collaboration delivers a joint…

WatchGuard joins AWS ISV Accelerate Program

WatchGuard® Technologies, a global leader in unified cybersecurity, has announced it has joined the Amazon Web Services (AWS) Independent Software Vendor (ISV) Accelerate Program, a co-sell program for AWS Partners that provides software solutions that run on or integrate with AWS.…

EFF Applauds Little Rock, AR for Cancelling ShotSpotter Contract

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> Community members coordinated to pack Little Rock City Hall on Tuesday, where board members voted 5-3 to end the city’s contract with ShotSpotter. Initially funded through a federal grant, Little Rock…

EFF Applauds Little Rock, AK for Cancelling ShotSpotter Contract

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> Community members coordinated to pack Little Rock City Hall on Tuesday, where board members voted 5-3 to end the city’s contract with ShotSpotter. Initially funded through a federal grant, Little Rock…

U.S. CISA adds Microsoft Outlook, Sophos XG Firewall, and other flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Outlook, Sophos XG Firewall, and other flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog: The…

IT Security News Daily Summary 2025-02-06

210 posts were published in the last hour 22:32 : Hackers Exploit 3,000 ASP.NET Machine Keys to Hack IIS Web Servers Remotely 22:32 : Analyzing ELF/Sshdinjector.A!tr with a Human and Artificial Analyst 22:32 : 7-Zip Vulnerability Actively Exploited in The…