News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Eliminate vulnerabilities in the software supply chain faster
B2B Cyber ​​Security ShortNews

Attacks on the software supply chain continue to increase, due in part to companies' increasing reliance on numerous third-party vendors and service providers. To keep a close eye on the threats facing today's organizations, Tanium has now added SBOM to its vulnerability management solution. Open Source Software Threat "Over 92 percent of applications contain open source libraries that may contain hidden vulnerabilities such as Log4j, OpenSSL or Struts that attackers can exploit," said Nic Surpatanu, Chief Product Officer at Tanium. “Tanium SBOM is the only solution on the…

Read more

Test: Can endpoint solutions be manipulated?
Test: Can endpoint solutions be manipulated?

AV-Comparatives has published the results of its anti-tampering protection test “Anti-Tampering Certification Test”, which shows whether endpoint solutions defend themselves against tampering: CrowdStrike, ESET, Kaspersky and Palo Alto Networks. The test attempts to disable or modify user and kernel space components of endpoint solutions to assess their anti-tampering properties. The test evaluates whether it is possible to disable or change AV/EPP/EDR components or functions through manipulation, with all tampering activities (manipulation) performed in the Windows user area. The following products are included in the test. CrowdStrike Falcon Enterprise ESET PROTECT Entry Kaspersky Endpoint Security for Business Palo…

Read more