searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

Java

Get our top stories in your inbox

Spring4Shell: No need to panic, but mitigations are advised

March 31, 2022

Security teams around the world got another shock on Thursday when news of disclosure of a PoC for an unauthenticated RCE zero-day vulnerability in Spring Core, a massively …

Experts uncover Elephant Beetle, an organized financial-theft operation

January 6, 2022

Sygnia announced that it has released its comprehensive report uncovering an organized financial-theft operation it has termed Elephant Beetle. For the past two years, the …

Trojan Source bugs may lead to extensive supply-chain attacks on source code

November 2, 2021

Cambridge University researchers have detailed a new way targeted vulnerabilities can be introduced into source code while making them invisible to human code reviewers, …

Infoworks 5.0 accelerates and lowers cost of cloud migration and analytics deployment

October 10, 2021

Infoworks announced Version 5.0 – the latest release of the company’s comprehensive software solution for automated cloud migration and enterprise data operations. As …

Oracle Java 17 delivers thousands of performance and security updates

September 14, 2021

Oracle released Java 17, the latest version of the world’s number one programming language and development platform. Java 17 delivers thousands of performance, …

Granulate gProfiler provides support to Graviton processors to improve code quality

September 4, 2021

Granulate announced the latest addition to its gProfiler, which now provides support to Graviton processors. With this new addition to gProfiler, organizations running …

Granulate adds Kubernetes filtering feature to open-source gProfiler

August 27, 2021

Granulate released new Kubernetes filters feature to the company’s gProfiler. gProfiler is an open-source production profiling solution that measures the performance of code …

Actian Zen 15 delivers multi-platform support for secure data management from edge to cloud

July 16, 2021

Actian announced the general availability of its new Zen V15 embedded database for mobile and IoT. Actian Zen V15 addresses the demanding needs of today’s on-premise, cloud, …

RtBrick Management API simplifies integration with existing OSS and BSS systems

July 1, 2021

RtBrick has announced a new Management API for its disaggregated routing software that simplifies the integration with existing OSS and BSS systems. It dramatically reduces …

LoginID SDK empowers developers to integrate FIDO strong authentication into their websites or apps

July 1, 2021

LoginID announced additional SDK options for developers. These SDKs empower developers to integrate FIDO strong authentication into their websites or apps. A recent PYMNTS …

Red Hat OpenShift 4.8 helps organizations accelerate the creation of new cloud-native applications

June 30, 2021

Red Hat announced Red Hat OpenShift 4.8, the latest version of the enterprise Kubernetes platform. Providing a powerful foundation to develop and connect diverse workloads …

Red Hat Process Automation helps orgs automate complex business decisions and procedures

June 24, 2021

Red Hat announced new end-to-end Kubernetes-native decision management capabilities as part of the latest release of Red Hat Process Automation. Based on the open source …

Posts navigation

1 2 3 4 5 … 11

Featured news

  • How parents can talk about online safety and personal info protection with their kids
  • Why digital trust needs to be a strategic imperative for your company
  • Exploring the insecurity of readily available Wi-Fi networks
Detection, isolation, and negotiation: Improving your ransomware preparedness and response

What's new

Photos: Cyber Week 2022

How parents can talk about online safety and personal info protection with their kids

Destructive firmware attacks pose a significant threat to businesses

Why digital trust needs to be a strategic imperative for your company

Don't miss

Photos: Cyber Week 2022

How parents can talk about online safety and personal info protection with their kids

Destructive firmware attacks pose a significant threat to businesses

Why digital trust needs to be a strategic imperative for your company

Researchers uncover ZuoRAT malware targeting home-office routers

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • OT security: Helping under-resourced critical infrastructure organizations
  • How to keep your NFTs safe from scammers
  • Is your organization ready for Internet Explorer retirement?
  • Attackers aren’t slowing down, here’s what researchers are seeing

(IN)SECURE Magazine ISSUE 71.5 (June 2022)

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise