Thales acquires two cybersecurity companies
Thales announced that it had reached an agreement with Sonae Investment Management to buy two European cybersecurity firms, S21sec and Excellium, for 120 million euros ($125.32 million).
In a statement, Europe's largest armaments electronics company, which also develops civil aviation components... Read more
Critical authentication bypass flaw in multiple VMware products
VMware urges customers to immediately patch a critical authentication bypass flaw affecting multiple products.
Two vulnerabilities allows attackers with backdoor access to gain admin privileges on multiple VMware products -- and that's not a good thing.
Bruno Lopez of Innotec Security w... Read more
Barracuda unveils new web application and API security capabilities
Barracuda's WAAP platform offers increased protection on multiple fronts.
This week, Barracuda announced the expansion of Barracuda Cloud Application Protection, its platform for Web Application and API Protection (WAAP). The new release adds automated API Discovery and GraphQL security capabili... Read more
‘Millions of attacks on WordPress plugin Tatsu’
Researchers from security specialist Worldfence discovered millions of attacks on outdated versions of WordPress plugin Tatsu. Attackers are dropping malware with ease.
The newly found attacks target a remote code execution vulnerability in the WordPress plugin Tatsu. Tatsu is a no-code page bu... Read more
New Bluetooth relay attack leaves devices vulnerable
Security researchers from NCC Group discovered a relay attack method for accessing Bluetooth devices. Some car models are affected.
The newly discovered relay attack allows hackers to access Bluetooth devices such as cars with wireless locks. These locks are typically opened with mobile devices... Read more
How do you interpret the results of MITRE ATT&CK evaluations?
Not all detections are created equal. Keep that in mind when choosing cybersecurity tools.
The cybersecurity market is very fragmented. Organizations looking to improve their security posture have a tremendously wide range of solutions to choose from. This ensures that there are many offerings f... Read more
Research: new tools and security measures often counterproductive
Research by Zivver reveals that although companies have accelerated their innovation efforts in the past two years, many challenges remain. Employees that participated in the study complain about security measures that are counterproductive and slow down work. Many applications have been added in t... Read more
Use of malicious PHP code by hackers leads to stolen credit card data
Te FBI states that unidentified hackers created a backdoor into a victim’s system and accessed their credit card data.
The FBI has issued a warning stating that unidentified individuals have been scraping credit card data from the checkout pages of US websites and E-commerce business owners ar... Read more
Nasuni introduces ransomware protection for file data
Nasuni recently introduced Nasuni Ransomware Protection. The solution protects unstructured file data against ransomware attacks.
Nasuni wants to better protect unstructured data against the risks of ransomware attacks. Nasuni Ransomware Protection provides 'inline' ransomware edge detection fun... Read more
Google Cloud expands ‘invisible’ security solutions
Google Cloud is significantly expanding its so-called 'invisible security' portfolio. The solutions allow customers to better secure their software supply chains, embrace zero trust architectures and improve cloud governance in general.
According to the public cloud giant, the new security solut... Read more