News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Machine learning supports malware and botnet defense
Machine learning supports malware and botnet defense

ExtraHop's machine learning dataset helps detect and mitigate malware and botnet operations faster. The data set with 16 million rows will soon be available as open source. ExtraHop, a leader in cloud-native Network Detection and Response (NDR), today announced that it is open sourcing its massive 16 million-row data set - one of the most robust on the market - to support algorithmic mitigation generated domains (DGAs). This is intended to improve the level of competition for defense attorneys and help companies...

Read more

Source of risk open source licenses
Source of risk open source licenses

While vulnerabilities in open source code continue to make headlines, such as Other technologies, such as Heartbleed and Log4Shell, go unnoticed by a hidden source of open source risk - non-compliance with open source licenses. Open source software licenses are a major source of risk, Palo Alto Networks believes, because even a single non-compliant license in the software can lead to legal action, time-consuming remedial actions, and delays in getting a product to market. Despite the obvious risk, being compliant with licensing regulations is no easy feat. The variety of open source licenses and the difficulty of determining which licenses apply to a piece of software makes…

Read more

Open source tool "Chain-Bench" for more security
Open source tool "Chain-Bench" for more security

Aqua Security Partners with Center for Internet Security to Introduce First Guide to Security in the Software Supply Chain; Chain-Bench is the first open-source tool to validate the software supply chain to ensure compliance with these new CIS guidelines Aqua Security, the leader in cloud native security, and the Center for Internet Security (CIS), today released the industry's first formal guidelines for software supply chain security. CIS is an independent, non-profit organization dedicated to creating more trust in the connected world. The CIS software…

Read more

LofyLife: Campaign distributes infected open source code packages
Kaspersky_news

Two days ago, on July 26, Kaspersky experts discovered a new malicious campaign called 'LofyLife' using the internal automated system monitoring open source repositories. The public collection of open source code packages is thus compromised. The campaign uses four malicious packages that proliferate 'Volt Stealer' and 'Lofy Stealer' malware in the open-source npm repository. They collect various information from their victims, including Discord tokens and credit card information, and spy on them over time. Infected Open Source Code Packages The npm repository is a public collection of open source code packages widely used in front-end web apps, mobile apps, robots and routers and…

Read more

Study: CISOs rely on open source and cloud native

As a study by Aqua Security shows: CISOs rely on open source and cloud native. The result shows CISOs' perceptions of cloud native security and open source in IT security. Aqua Security, the leader in pure cloud native security, today released a new study on perceptions of open source solutions and cloud native security. The report is based on a survey of 100 US CISOs (Chief Information Security Officers) at Fortune 1000 companies, commissioned by Aqua Security. The purpose of the study was to increase the understanding and views of...

Read more

Cybersecurity innovations with open source community
B2B Cyber ​​Security ShortNews

New open source community encourages secure collaboration and knowledge sharing between developers and security technical professionals on PKI, digital certificates and cryptographic tools for cybersecurity. Keyfactor, the machine and IoT identity platform for modern enterprises, presents their new open source community. The community provides developers, operations professionals, and technical teams with the in-depth knowledge and open-source tools needed to implement the best security solutions, or for specific products. Security tool for developers Security is a mission-critical factor for almost every company that develops connected products or online services. Technical and operational teams are increasingly relying on Public Key Infrastructure (PKI)…

Read more

Trend Micro and Snyk cooperate
Trend Micro News

Trend Micro and Snyk develop a joint solution against open source vulnerabilities. The expansion of the partnership is intended to close the gap between DevOps and IT security. Trend Micro is working with Snyk to develop a new solution for vulnerability management in open source code. This enables security teams to minimize the risk of security gaps in open source code as soon as it is integrated - without interrupting the delivery process. The Japanese IT security provider and the leading company in the developer-first open source security sector are building their strategic partnership out of weak points by 3 times in 2,5 years utilized…

Read more