Security News > 2020 > September

Druva announced beta support for Kubernetes workloads which delivers complete application protection that is accessible by all teams, including the central IT team and DevOps. Now, instead of adopting yet another point backup tool specifically for Kubernetes, businesses can protect Kubernetes applications and their underlying infrastructure within Druva alongside their existing workloads.

Qualys announced that Infosys will integrate Qualys VMDR and Multi-Vector EDR into its CyberNext Platform, a managed security service offering. Powered by the Qualys Cloud Platform, Qualys VMDR and Multi-Vector EDR will collect vast amounts of telemetry from the Qualys Cloud Agent and multiple sensors, to combine with network information, for a broad view of the environment, going beyond just the endpoint.

The business need at the intersection of market demands and performance requirements lies at the heart of today's launch of the joint Gigamon and Nokia 5G solution. Gigamon delivers real-time analytics for its global customers, providing the network traffic visibility required by 5G providers for seamless performance.

SentinelOne announced the appointment of David Bernhardt as CFO. Drawing upon more than 20 years of SaaS experience in financial operations management of pre- and post-IPO companies, Mr. Bernhardt will support SentinelOne's rapid growth in the endpoint, cloud, and IoT security markets as it enters the next phase of its development. "Our ability to consistently innovate and execute on both technology and go-to-market has attracted more than 4,000 customers to choose SentinelOne in record time," said Tomer Weingarten, Co-founder and CEO, SentinelOne.

Administrators running Samba as their domain controllers should update their installations as the open-source software suffers from the same ZeroLogon hole as Microsoft's Windows Server. We're told Samba running as an Active Directory or classic NT4-style domain controller is at risk, and although file-server-only installations are not directly affected, "They may need configuration changes to continue to talk to domain controllers."

Bounty-hunting hackers are uncovering new vulnerabilities every two minutes on average, according to bug bounty platform HackerOne. "Mickos rejected the idea that ethical hackers deprived of a legitimate bug bounty market would instead sell newly discovered vulnerabilities to black hats for exploitation, saying:"If we didn't organise this program, the vulnerabilities would not be sold to criminals.

Google has stomped out several serious code-execution flaws in its Chrome browser. The high-severity flaws include an out-of-bounds read error in storage in Google Chrome.

De Guzman was poor, and internet access was expensive. He felt that getting online was almost akin to a human right.

In a blog post published Tuesday, NordPass revealed the top 200 most popular usernames based on research from a white hat hacker. The most common username was ยศกร, which means "Title" in Thai.

WizCase experts have identified an unprotected Elasticsearch server that contained terabytes of data pertaining to users of Microsoft's Bing mobile application. White hat hacker Ata Hakcil, who identified the leak, was able to confirm that the Elasticsearch server belonged to Microsoft's Bing mobile app by installing the application and running a search for WizCase.