Best Practices for IT Security Teams in the Age of Cloud

About a decade ago, organizations were hesitant to adopt cloud solutions, with many citing security concerns. Fast forward to 2019, and 81% of organizations have a multi-cloud strategy, spurred on by the desire for increased flexibility, usage-based sp… Continue reading Best Practices for IT Security Teams in the Age of Cloud

Managed Vulnerability Management? Yes, You Read That Right

The importance of a mature vulnerability management program can’t be overstated. File integrity monitoring (FIM) and security configuration management (SCM) might be the bedrock of a strong cybersecurity program, but they can only go so far. Scan… Continue reading Managed Vulnerability Management? Yes, You Read That Right

Here’s how DHS prepared to keep hackers out of the Super Bowl

When the New England Patriots and Los Angeles Rams kick off in Atlanta on Sunday, a network of at least nine operational centers staffed by city, state, and federal officials will be humming with activity near the stadium to monitor for cyber and physical threats. About 60 employees from DHS’s Cybersecurity and Infrastructure Security Agency (CISA) will be onsite — with a DHS cyber official at each operational center — making it one of the biggest DHS cybersecurity operations at a Super Bowl to date. “We really want everything to run smoothly,” Klint Walker, a DHS cybersecurity adviser in Atlanta told CyberScoop, adding that the goal is to keep opportunistic attackers who would target a high-profile event “from making the newspaper.” Walker was part of a team of DHS officials who worked through the 35-day partial government shutdown without pay to finish assessing and mitigating cybersecurity risk at the Super Bowl. […]

The post Here’s how DHS prepared to keep hackers out of the Super Bowl appeared first on CyberScoop.

Continue reading Here’s how DHS prepared to keep hackers out of the Super Bowl

8 Best WordPress Scanners to Help Find Security Vulnerabilities

Do you have a WordPress website? Is it secure enough? Well, it’s an open secret today that no website is 100 percent secure. It’s easy for clever cybercriminals to find security vulnerabilities and then hijack and misuse your WordPress webs… Continue reading 8 Best WordPress Scanners to Help Find Security Vulnerabilities

10 Essential Network Vulnerability Scanning Tools

Network security is of prime importance in today’s world. That is why network scanning, or rather network vulnerability scanning, plays such a crucial role in the overall security of any enterprise and the data that it handles. Here’s a loo… Continue reading 10 Essential Network Vulnerability Scanning Tools

OpenVAS Authenticated Scan using Local Security Checks

An authenticated scan may provide more vulnerability details on the scanned system. During an authenticated scan the target is both scanned from the outside via the network and from the inside via a valid user […]
The post OpenVAS Authenticated Scan … Continue reading OpenVAS Authenticated Scan using Local Security Checks

Netsparker gets $40 million to grow its security scanner business

The market for vulnerability scanning tools is a crowded one. Yet the money continues to flow for companies looking to cement their share. Case in point: London-based Netsparker announced Thursday it has secured $40 million in private funding from San Francisco-based private equity firm Turn/River Capital. Netsparker likes to separate itself from its competitors by relying on what the company calls “proof-based scanning technology,” which avoids overwhelming security practitioners with false positives. The scanner actually exploits vulnerabilities, provides proof in a read-only manner, and gives security teams a better idea of what needs to be prioritized. “With overwhelming market demand for this solution in the face of increasing security and compliance regulations, such as Europe’s GDPR, Netsparker aims to become the de facto solution for enterprises that need to secure thousands of web applications at scale,” said Netsparker CEO Ferruh Mavituna. Netsparker lists Sony, Siemens and The Walt Disney Company […]

The post Netsparker gets $40 million to grow its security scanner business appeared first on Cyberscoop.

Continue reading Netsparker gets $40 million to grow its security scanner business

Hacker Distributes Backdoored IoT Vulnerability Scanning Script to Hack Script Kiddies

Nothing is free in this world.

If you are searching for free hacking tools on the Internet, then beware—most freely available tools, claiming to be the swiss army knife for hackers, are nothing but a scam.

For example, Cobian RAT and a Facebook hacking tool that we previously reported on The Hacker News actually could hack, but of the one who uses them and not the one you desire to hack.

Continue reading Hacker Distributes Backdoored IoT Vulnerability Scanning Script to Hack Script Kiddies

Vulnerability Scanning vs. Penetration Testing

It amazes me how many people confuse the importance of vulnerability scanning with penetration testing. Vulnerability scanning cannot replace the importance of penetration testing, and penetration testing on its own cannot secure the entire network. Bo… Continue reading Vulnerability Scanning vs. Penetration Testing