Security News

JetBrains keeps mum on 26 'security problems' fixed after Rapid7 spat
2024-03-28 17:26

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Nvidia's newborn ChatRTX bot patched for security bugs
2024-03-28 15:33

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

How Pentesting-as-a-Service can Reduce Overall Security Costs
2024-03-28 14:01

Gain a deeper understanding of the difference between classing pen testing and PTaaS, explore the true costs of legacy pen testing, and gain insights into the many benefits of adopting PTaaS. How do classic penetration tests work? A hybrid alternative to traditional pen testing, PTaaS is a cloud-native, semi-automated service that delivers on-demand pen testing.

New Webinar: Avoiding Application Security Blind Spots with OPSWAT and F5
2024-03-28 12:43

Considering the ever-changing state of cybersecurity, it's never too late to ask yourself, "am I doing what's necessary to keep my organization's web applications secure?" The continuous evolution...

Enterprises increasingly block AI transactions over security concerns
2024-03-28 05:30

AI has already become a part of business as usual, as enterprises leverage and integrate new features and tools into their day-to-day workflows, multiplying the volume of transactions and data generated. Despite the mounting security risk and increasing number of data protection incidents, enterprises are adopting AI tools in large numbers.

Hiring Kit: Security Analyst
2024-03-27 16:00

In general, security analysts are tasked with identifying weaknesses in current security systems and developing solutions to close security vulnerabilities. The kit includes salary details, a job description, interview questions and a job advert.

Security Vulnerability in Saflok’s RFID-Based Keycard Locks
2024-03-27 11:01

The technique is a collection of security vulnerabilities that would allow a hacker to almost instantly open several models of Saflok-brand RFID-based keycard locks sold by the Swiss lock maker Dormakaba. By exploiting weaknesses in both Dormakaba's encryption and the underlying RFID system Dormakaba uses, known as MIFARE Classic, Carroll and Wouters have demonstrated just how easily they can open a Saflok keycard lock.

How security leaders can ease healthcare workers’ EHR-related burnout
2024-03-27 06:00

Staff experiencing burnout in healthcare settings is not something that security leaders typically worry about - unless, maybe, it is the security team itself that is suffering from it. It turns out that - by homing in on the user experience of security mechanisms and processes - the security team can be an ally to those whose job it is to worry about burnout across the healthcare ecosystem.

Drozer: Open-source Android security assessment framework
2024-03-27 04:30

Drozer is an open-source security testing framework for Android, whose primary purpose is to make the life of mobile application security testers easier. The solution enables the identification of security vulnerabilities in applications and devices by taking on the role of an app and facilitating interactions with the Dalvik VM, other apps' IPC endpoints, and the operating system.

Tech industry’s focus on innovation leaves security behind
2024-03-26 04:00

Innovation fuels the technology industry, but it comes at a cost. Certain technology sub-sectors like software companies and infrastructure providers have complex supply chains, making it challenging to ensure the security of all components and services.