searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

SaltStack

Get our top stories in your inbox

Hackers breached six Cisco servers through SaltStack Salt vulnerabilities

May 29, 2020

Earlier this month, when F-Secure publicly revealed the existence of two vulnerabilities affecting SaltStack Salt and attackers started actively exploiting them, Cisco was …

Have you updated SaltStack Salt? Attacks are underway!

May 11, 2020

Have you updated your SaltStack Salt “masters” and made them inaccessible over the internet – or at least restricted access to them? Even though F-Secure …

SaltStack Salt vulnerabilities actively exploited by attackers, patch ASAP!

May 4, 2020

Two vulnerabilities in SaltStack Salt, an open-source remote task and configuration management framework, are being actively exploited by attackers, CISA warns. About …

SaltStack launches new SecOps for continuous compliance and IT security at scale

April 8, 2019

SaltStack, the creators of intelligent automation for IT operations and security teams, announced the general availability of SaltStack Enterprise 6.0 and the new SaltStack …

New infosec products of the week: November 9, 2018

November 9, 2018

DFLabs open framework enables integration of SOAR and security tools DFLabs launched a new version of the IncMan SOAR platform that provides an open integration framework for …

New SaltStack Enterprise 5.5 release delivers IT automation for hybrid infrastructure operations

November 8, 2018

SaltStack released SaltStack Enterprise 5.5 with new features to provide control of hybrid IT environments at scale. SaltStack Enterprise software reduces the burden of system …

Featured news

  • RansomHouse: Bug bounty hunters gone rogue?
  • Taking the right approach to data extortion
  • You should be able to trust organizations that handle your personal data
Easily migrate to the cloud with CIS Hardened Images

What's new

RansomHouse: Bug bounty hunters gone rogue?

Taking the right approach to data extortion

What does prioritizing cybersecurity at the leadership level entail?

Vishing cases reach all time high

Don't miss

RansomHouse: Bug bounty hunters gone rogue?

Taking the right approach to data extortion

What does prioritizing cybersecurity at the leadership level entail?

How confident are CISOs about their security posture?

You should be able to trust organizations that handle your personal data

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • Data centers on steel wheels: Can we trust the safety of the railway infrastructure?
  • Good end user passwords begin with a well-enforced password policy
  • Keep your digital banking safe: Tips for consumers and banks
  • Is cybersecurity talent shortage a myth?

(IN)SECURE Magazine ISSUE 71 (March 2022)

  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise