Microsoft releases tool to speed up recovery of systems borked by CrowdStrike update

By now, most people are aware of – or have been personally affected by – the largest IT outage the world have ever witnessed, courtesy of a defective update for Crowdstrike Falcon Sensors that threw Windows hosts into a blue-screen-of-death… Continue reading Microsoft releases tool to speed up recovery of systems borked by CrowdStrike update

XZ Utils backdoor update: Which Linux distros are affected and what can you do?

The news that XZ Utils, a compression utility present in most Linux distributions, has been backdoored by a supposedly trusted maintainer has rattled the open-source software community on Friday, mere hours until the beginning of a long weekend for man… Continue reading XZ Utils backdoor update: Which Linux distros are affected and what can you do?

Orca Flags Dangerous Google Kubernetes Engine Misconfiguration

Attackers could take over a Kubernetes cluster if access privileges are granted to all authenticated users in Google Kubernetes Engine.
The post Orca Flags Dangerous Google Kubernetes Engine Misconfiguration appeared first on SecurityWeek.
Continue reading Orca Flags Dangerous Google Kubernetes Engine Misconfiguration

Orca Sues Wiz Over Alleged Cloud Security Patent Violations

Orca Security sues its main rival, claiming patent infringements, intellectual property theft and even marketing copycat behavior.
The post Orca Sues Wiz Over Alleged Cloud Security Patent Violations appeared first on SecurityWeek.
Continue reading Orca Sues Wiz Over Alleged Cloud Security Patent Violations

Uncovering attacker tactics through cloud honeypots

Attackers typically find exposed “secrets” – pieces of sensitive information that allow access to an enterprise cloud environment — in as little as two minutes and, in many cases, begin exploiting them almost instantly, highlighting the urgent ne… Continue reading Uncovering attacker tactics through cloud honeypots

Video walkthrough: Cybertech Tel Aviv 2023

Help Net Security is in Israel this week for Cybertech Tel Aviv 2023, talking to the key players from the cybersecurity industry and businesses from a wide range of sectors, who gathered to exchange knowledge, to network, and learn about technological … Continue reading Video walkthrough: Cybertech Tel Aviv 2023

Photos: Cybertech Tel Aviv 2023

Cybertech Tel Aviv 2023 is under way at the Tel Aviv Expo. The conference and exhibition gathers cybersecurity experts, businesses and startups from around the world, and Help Net Security is there to take it all in. Here are a few photos from the even… Continue reading Photos: Cybertech Tel Aviv 2023

Most critical security gaps in the public cloud

Orca Security released the 2022 State of the Public Cloud Security Report, which provides important insights into the current state of public cloud security and where the most critical security gaps are found. One of the report’s key findings is that t… Continue reading Most critical security gaps in the public cloud

Infosec products of the month: July 2022

Here’s a look at the most interesting products from the past month, featuring releases from: Action1, Aqua Security, Cato Networks, CertiK, CoSoSys, CyberArk, Darktrace, Deloitte, EnGenius, Flashpoint, Fusion Risk Management, G-Core Labs, Kingston Digi… Continue reading Infosec products of the month: July 2022

New infosec products of the week: July 22, 2022

Here’s a look at the most interesting products from the past week, featuring releases from Cato Networks, CoSoSys, Darktrace, EnGenius, Orca Security, Persona, and Resecurity. Resecurity Digital Identity Protection defends individuals and businesses fr… Continue reading New infosec products of the week: July 22, 2022