Cyberpion rebrands as Ionix, offering new EASM visibility improvements

Ionix is adding a suite of new features to help extend the visibility of interconnected assets and deliver risk-based prioritization.

CSO Online
9 attack surface discovery and management tools

The main goal of cyber asset attack surface management tools is to protect information about a company’s security measures from attackers. Here are 9 tools to consider when deciding what is best for the business.

CSO Online
Two Patch Tuesday flaws you should fix right now

Vulnerabilities affecting both Outlook for Windows and Microsoft SmartScreen were patched recently — both could have wide-ranging impact.

CSO Online
Dell beefs up security portfolio with new threat detection and recovery tools

Dell Technologies has added improved MDR capabilities, cloud-based component verification, and a new cyber recovery solution along with a partnered threat management offering.

CSO Online
DNS data shows one in 10 organizations have malware traffic on their networks

Akamai report highlights how widespread malware threats remain, noting the dangers of threats specific to DNS infrastructure.

CSO Online
Akamai releases new threat hunting tool backed by Guardicore capabilities

Akamai Hunt combines the company’s historic DNS, WAF, and DDoS data with Guardicore’s segmentation and telemetry to detect and eliminate evasive threats.

CSO Online
Darktrace launches AI-driven vulnerability detection, alert system Newsroom

Newsroom uses AI-assisted knowledge of a customer’s external attack surface to measure exposure to detected vulnerabilities and provides a summary of exploits, affected software and assets.

CSO Online
5 top threats from 2022 most likely to strike in 2023

Study and prepare for these five threats and you will be well on your way to protecting your network, assets, and employees.

CSO Online
Remote code execution exploit chain available for VMware vRealize Log Insight

Researchers found four vulnerabilities in vRealize Log Insight that were relatively non-threatening on their own but lead to significant compromise when used together.

CSO Online
ServiceNow to detect open source security vulnerabilities with Snyk integration

ServiceNow Vulnerability Response users will now have access to Snyk’s product that scans open source code during the development process.

CSO Online