software
NetSecL Linux 3.2 released
NetSecL is a hardened, live and installable operating system based on OpenSuse suitable for desktop/server and penetration testing. Once installed you can fully enjoy the …
Active Directory Change Reporter 7.0 released
NetWrix released Active Directory Change Reporter 7.0 which automates auditing of who changed what, when and where in Active Directory, Group Policy and MS Exchange, for …
Secure mobile device access on single authentication platform
SafeNet announced its new mobile device credentialing solution that enables the secure use of consumer mobile devices on corporate networks. SafeNet’s Authentication …
Is WordPress next in line for silent updates?
Silent software updates are still a topic of contention in the security world, but the successful implementation of the process by Google for its Chrome browser has definitely …
Mitigating software vulnerabilities
Microsoft released a new whitepaper that describes how exploit mitigation technologies can help reduce or eliminate risk, prevent attacks and minimize operational disruption …
Trend Micro expands SecureCloud
Trend Micro SecureCloud, the encryption service with policy-based key management, has been expanded with a new offering designed for cloud service providers, as well as …
Apache Tomcat security bypass vulnerability
A security issue and a vulnerability have been reported in Apache Tomcat, which can be exploited by malicious, local users to bypass certain security restrictions or cause a …
SSH client PuTTY 0.61 released
After four long years, here comes a new version of PuTTY, the popular free telnet/SSH client for Windows and Unix platforms. PuTTY 0.61 brings new features, bug fixes, and …
Microsoft releases new preview of SQL Server “Denali”
Microsoft released the next public CTP of Microsoft SQL Server “Denali” packed with Business Intelligence (BI) improvements and innovations for relational …
SquirrelMail multiple vulnerabilities
Multiple vulnerabilities have been reported in SquirrelMail, according to Secunia. These vulnerabilities can be exploited by malicious users to conduct script insertion …
Critical vulnerability in Sun Java
ACROS Security has discovered a vulnerability in Sun Java, which can be exploited by malicious people to compromise a user’s system, according to Secunia. The …
How to secure a moving target with limited resources
Today, as security threats increase and regulatory requirements grow more complex, businesses are recognizing that compliance and security are business-critical priorities. …
Featured news
Resources
Don't miss
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse
- Train smarter, respond faster: Close the skill gaps in your SOC