November 2024
CWE top 25 most dangerous software weaknesses
The CWE list of the 25 most dangerous software weaknesses demonstrates the currently most common and impactful software flaws. Identifying the root causes of these …
Enhancing visibility for better security in multi-cloud and hybrid environments
In this Help Net Security interview, Brooke Motta, CEO of RAD Security, talks about how cloud-specific threats have evolved and what companies should be watching out for. She …
Preventing credential theft in the age of AI
In this Help Net Security video, Dr. Tina Srivastava, PhD, MIT Lecturer and CEO of Badge, discusses a 20-year cryptography problem – using biometrics for authentication …
Full recovery from breaches takes longer than expected
In 2024, businesses reported taking an average of 7.3 months to recover from cybersecurity breaches – 25% longer than expected and over a month past the anticipated …
GitHub Secure Open Source Fund: Project maintainers, apply now!
GitHub is calling on maintainers of open source projects to apply for the newly opened Secure Open Source Fund, to get funding and knowledge to improve the security and …
Oracle Linux 9 Update 5 brings security updates, OpenJDK 17, .NET 9.0
Oracle Linux offers a secure, streamlined platform for deploying and managing applications across on-premises, cloud, and edge environments. Designed for demanding workloads, …
Quantum DXi9200 helps organizations manage and reduce cybersecurity risks
Quantum announces the DXi9200, the latest generation of its flagship DXi9000 Series hybrid (flash + dense disk) data protection appliances, designed for scalable, efficient …
Apple fixes 2 zero-days exploited to breach macOS systems (CVE-2024-44309, CVE-2024-44308)
Apple has released emergency security updates for macOS Sequoia that fix two zero-day vulnerabilities (CVE-2024-44309, CVE-2024-44308) that “may have been actively …
ArmorCode unifies application security with infrastructure vulnerability management
ArmorCode announced the growth of its ASPM Platform with the ability to unify AppSec and infrastructure vulnerability management. The continued innovation of Risk-Based …
Tanium Cloud Workloads provides visibility and protection for containerized environments
Tanium announced Tanium Cloud Workloads, providing real-time visibility and protection for containerized environments. Through image vulnerability scanning, container run-time …
OpenText Cloud Editions 24.4 blends AI with secure data connectivity
OpenText unveiled Cloud Editions (CE) 24.4, presenting a suite of transformative advancements in Business Cloud, AI, and Technology to empower the future of AI-driven …
Exabeam and Wiz join forces to improve cloud security
Exabeam coolaborates with with Wiz to provide organizations with improved threat detection, investigation, and response (TDIR) capabilities, ensuring a more secure and …
Featured news
Resources
Don't miss
- Hackers probe, exploit newly patched BeyondTrust RCE flaw (CVE-2026-1731)
- Brutus: Open-source credential testing tool for offensive security
- Why secure OT protocols still struggle to catch on
- Edge computing’s biggest lie: “We’ll patch it later”
- Cyber risk is becoming a hold-period problem for private equity firms