searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

Python

Get our top stories in your inbox

Attackers employ novel methods to backdoor French organizations

March 21, 2022

An advanced threat actor has been spotted using distinctive, novel methods to backdoor French entities in the construction, real estate, and government industries. How the …

Malicious Python packages employ advanced detection evasion techniques

November 22, 2021

JFrog researchers have discovered 11 malicious Python packages on PyPI, the official third-party package repository for Python, which have been collectively downloaded over …

Trojan Source bugs may lead to extensive supply-chain attacks on source code

November 2, 2021

Cambridge University researchers have detailed a new way targeted vulnerabilities can be introduced into source code while making them invisible to human code reviewers, …

Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

October 13, 2021

Panther Labs announced Panther for AWS security, a security logging solution designed for AWS security teams. Now, AWS security teams will have a single platform for …

Infoworks 5.0 accelerates and lowers cost of cloud migration and analytics deployment

October 10, 2021

Infoworks announced Version 5.0 – the latest release of the company’s comprehensive software solution for automated cloud migration and enterprise data operations. As …

Researchers discover ransomware that encrypts virtual machines hosted on an ESXi hypervisor

October 7, 2021

Sophos has released details of a new ransomware written in Python that attackers used to compromise and encrypt virtual machines hosted on an ESXi hypervisor. The report …

Granulate gProfiler provides support to Graviton processors to improve code quality

September 4, 2021

Granulate announced the latest addition to its gProfiler, which now provides support to Graviton processors. With this new addition to gProfiler, organizations running …

Granulate adds Kubernetes filtering feature to open-source gProfiler

August 27, 2021

Granulate released new Kubernetes filters feature to the company’s gProfiler. gProfiler is an open-source production profiling solution that measures the performance of code …

Actian Zen 15 delivers multi-platform support for secure data management from edge to cloud

July 16, 2021

Actian announced the general availability of its new Zen V15 embedded database for mobile and IoT. Actian Zen V15 addresses the demanding needs of today’s on-premise, cloud, …

RtBrick Management API simplifies integration with existing OSS and BSS systems

July 1, 2021

RtBrick has announced a new Management API for its disaggregated routing software that simplifies the integration with existing OSS and BSS systems. It dramatically reduces …

LoginID SDK empowers developers to integrate FIDO strong authentication into their websites or apps

July 1, 2021

LoginID announced additional SDK options for developers. These SDKs empower developers to integrate FIDO strong authentication into their websites or apps. A recent PYMNTS …

AWS BugBust Challenge: A global competition for developers to identify and fix software bugs

June 28, 2021

Amazon Web Services announced the AWS BugBust Challenge, a global competition for developers to collectively eliminate one million software bugs. With just a few clicks, …

Posts navigation

1 2 3

Featured news

  • BLE vulnerability may be exploited to unlock cars, smart locks, building doors, smartphones
  • Kali Linux 2022.2 released: Desktop enhancements, tweaks for the terminal, new tools, and more!
  • Mastering microsegmentation for enterprise applications
Download guide: Evaluating third-party security platforms

What's new

BLE vulnerability may be exploited to unlock cars, smart locks, building doors, smartphones

Kali Linux 2022.2 released: Desktop enhancements, tweaks for the terminal, new tools, and more!

Mastering microsegmentation for enterprise applications

Cardiologist charged for use and sale of ransomware

Don't miss

Easily migrate to the cloud with CIS Hardened Images

BLE vulnerability may be exploited to unlock cars, smart locks, building doors, smartphones

Kali Linux 2022.2 released: Desktop enhancements, tweaks for the terminal, new tools, and more!

Cardiologist charged for use and sale of ransomware

Mastering microsegmentation for enterprise applications

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • Data centers on steel wheels: Can we trust the safety of the railway infrastructure?
  • Good end user passwords begin with a well-enforced password policy
  • Keep your digital banking safe: Tips for consumers and banks
  • Is cybersecurity talent shortage a myth?

(IN)SECURE Magazine ISSUE 71 (March 2022)

  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise