Tag: EN

Seven Deadly Myths of DDoS Protection

Myth (noun). 1. an ancient story or set of stories, especially explaining the early history of a group of people or about natural events and facts; 2. a commonly believed but false idea.  Myths in their purest form have been…

Durex data breach leaks sensitive details of customers

Durex India, a prominent sexual wellness brand known for its condoms and intimate products, has recently suffered a cyber attack that compromised sensitive customer information. The breach has led to the exposure of personal data including full names, contact numbers,…

Simplify identity management with Red Hat IdM

Red Hat Identity Management (IdM) is a centralized and comprehensive identity management solution that provides a wide range of features designed to help manage user identities, enforce security policies and facilitate access management. IdM offers a number of tailored and…

Use cases and ecosystem for OpenShift confidential containers

Red Hat OpenShift sandboxed containers, built on Kata Containers, provide the additional capability to run confidential containers (CoCo). This article continues our previous one, Exploring the OpenShift confidential containers solution and looks at different CoCo use cases and the ecosystem…

Exploring the OpenShift confidential containers solution

Red Hat OpenShift sandboxed containers, built on Kata Containers, now provide the additional capability to run confidential containers (CoCo). Confidential Containers are containers deployed within an isolated hardware enclave protecting data and code from privileged users such as cloud or…

RansomHub Breached Over 200 Victims, the FBI Says

RansomHub ransomware affiliates have reportedly breached over 200 victims from a wide range of critical U.S. infrastructure sectors. This ransomware-as-a-service (RaaS) operation reached this milestone quickly, being first spotted in February 2024. The ransomware group specializes in data-theft-based extortion rather…

What Is XDR Threat Hunting?

Extended detection and response (XDR) products have become an increasingly common feature of the cybersecurity market in recent years. Today, they’re by far the most advanced option on the market for identifying and responding to emerging threats and sophisticated attacks.…

Cybercriminals Capitalize on Travel Industry’s Peak Season

Cequence Security found that cyberattacks against the travel industry surge during holidays, with 91% of severe vulnerabilities in the top 10 travel and hospitality sites enabling man-in-the-middle attacks. This article has been indexed from Cyware News – Latest Cyber News…

The Enterprise Guide to Cloud Security Posture Management

Editor’s Note: The following is an article written for and published in DZone’s 2024 Trend Report, Enterprise Security: Reinforcing Enterprise Application Defense. Many companies wrongly believe that moving to the cloud means their cloud provider is fully responsible for security. However,…

Innovator Spotlight: SNYK

It’s time to give your development process a boost. We’ve all been there staring at a security issue, trying to figure out the best way to fix it without breaking… The post Innovator Spotlight: SNYK appeared first on Cyber Defense…

Publishers Spotlight: Blumira

I was thrilled to catch up with Blumira during Black Hat USA 2024. When it comes to resource-constrained businesses, traditional security information and event management (SIEM) systems can seem like… The post Publishers Spotlight: Blumira appeared first on Cyber Defense…