cloud computing
![vmware](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/18110129/vmware-2024-1500-400x200.webp)
Critical RCE flaws in vCenter Server fixed (CVE-2024-37079, CVE-2024-37080)
VMware by Broadcom has fixed two critical vulnerabilities (CVE-2024-37079, CVE-2024-37080) affecting VMware vCenter Server and products that contain it: vSphere and Cloud …
![fluentbit](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/21130551/fluentbit-1500-400x200.webp)
Critical Fluent Bit flaw affects major cloud platforms, tech companies’ offerings (CVE-2024-4323)
Tenable researchers have discovered a critical vulnerability (CVE-2024-4323) in Fluent Bit, a logging utility used by major cloud providers and tech companies, which may be …
![vmware](https://img.helpnetsecurity.com/wp-content/uploads/2022/05/19125355/vmware-1600-hns-400x200.jpg)
VMware pushes admins to uninstall vulnerable, deprecated vSphere plugin (CVE-2024-22245, CVE-2024-22250)
VMware Enhanced Authentication Plug-in (EAP), a plugin for VMware vSphere, has two vulnerabilities (CVE-2024-22245, CVE-2024-22250) that could be exploited by attackers to …
![Alexander Hagenah](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/04140117/alexander_hagenah-2-six_group-400x200.jpg)
Embracing offensive cybersecurity tactics for defense against dynamic threats
In this Help Net Security, Alexander Hagenah, Head of Cyber Controls at SIX, discusses the critical steps in creating effective offensive security operations and their impact …
![](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/10085314/devsecops3-400x200.jpg)
4 warning signs that your low-code development needs DevSecOps
Low code platforms have democratized development in the enterprise. They improve efficiency and enable companies to do more with less. But as you begin to do more you will …
![Linux](https://img.helpnetsecurity.com/wp-content/uploads/2022/06/10122853/linux-red-danger-400x200.jpg)
Looney Tunables bug exploited for cryptojacking
Kinsing threat actors have been spotted exploiting the recently disclosed Looney Tunables (CVE-2023-4911) vulnerability to covertly install cryptomining software into …
![cybersecurity staff shortages](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/31144403/cybersecurity-staff-shortages-400x200.jpg)
Cybersecurity workforce shortages: 67% report people deficits
The global cybersecurity workforce has reached 5.5 million people, an 8.7% increase from 2022, representing 440,000 new jobs, according to ISC2. While this is the highest …
![Java](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/26165425/java-logo-400x200.jpg)
The hidden costs of Java, and the impact of pricing changes
An overwhelming 98% of all the businesses surveyed use Java in their software applications or infrastructure, and 57% of those organizations indicate that Java is the backbone …
![data analytics](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11203458/data_analytics5-400x200.jpg)
High-business-impact outages are incredibly expensive
In this Help Net Security video, Peter Pezaris, Chief Strategy and Design Officer at New Relic, discusses observability adoption and how full-stack observability leads to …
![software](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25144120/software-tools-400x200.jpg)
What AppSec and developers working in cloud-native environments need to know
All enterprise organizations are, in essence, software publishers, regardless of their industry. This is because every enterprise relies on custom software applications for …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095945/cloud2-400x200.jpg)
Access control in cloud-native applications in multi-location environments (NIST SP 800-207)
NIST released Special Publication (SP) 800-207A – “A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Location …
![eyes](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/19143700/eyes-400x200.jpg)
Lack of visibility into cloud access policies leaves enterprises flying blind
Fragmented access policies are top security concern in multi-cloud environments, with more than 75% of enterprises reporting they do not know where applications are deployed …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege