Cybersecurity

Snyk Acquires Helios

Developer-focused security company Snyk said it has acquired Helios, a startup focused on helping developers troubleshoot applications in runtime and production. The acquisition enhances Snyk’s “cloud-to-code risk visibility” by combining Helios’ full-stack runtime data collection and insights with the Snyk Developer Security Platform, Snyk said in a statement. While security testing, such as static analysis […]

Cybersecurity

Crypto trading firm closes shop after $8 million NY state fine over security issues

A cryptocurrency trading company has shut down after agreeing to pay an $8 million penalty and surrender its licenses to New York state regulators, who found it had violated multiple financial industry rules, including cybersecurity protections. Genesis Global Trading, Inc. had “compliance failures” that “left the company vulnerable to illicit activity and cybersecurity threats,” including […]

Cybersecurity

Citrix warns admins to immediately patch NetScaler for actively exploited zero-days

Citrix warns admins to immediately patch NetScaler for actively exploited zero-days Pierluigi Paganini January 17, 2024 Citrix fixed two actively exploited zero-day vulnerabilities impacting Netscaler ADC and Gateway appliances. Citrix warns customers to install security updates to address two actively exploited zero-day vulnerabilities, tracked as CVE-2023-6548 and CVE-2023-6549, impacting Netscaler ADC and Gateway appliances. “Exploits […]

Cybersecurity

PAX PoS Terminal Flaw Could Allow Attackers to Tamper with Transactions

Jan 17, 2024NewsroomFinancial Data / Vulnerability The point-of-sale (PoS) terminals from PAX Technology are impacted by a collection of high-severity vulnerabilities that can be weaponized by threat actors to execute arbitrary code. The STM Cyber R&D team, which reverse engineered the Android-based devices manufactured by the Chinese firm owing to their rapid deployment in Poland, […]

Cybersecurity

Adalanche: Open-source Active Directory ACL visualizer, explorer – Help Net Security

Adalanche provides immediate insights into the permissions of users and groups within an Active Directory. It’s an effective open-source tool for visualizing and investigating potential account, machine, or domain takeovers. Additionally, it helps identify and display any misconfigurations. What unique features make Adalanche stand out? “The best feature is the low user effort to get […]