433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (727) 493-2351

Deepfence ThreatMapper 1.2.0 helps DevSecOps professionals identify critical vulnerabilities

Deepfence released ThreatMapper 1.2.0, which offers significant feature upgrades since the first fully open source release of the project in October 2021. ThreatMapper 1.2.0 adds several in-demand features, including Attack Path Visualization, with a more sophisticated and representative calculation of the Most Exploitable Vulnerabilities, support for discovering and scanning AWS Fargate workloads for vulnerabilities, ARM support, and support for integration with Google Chronicle. Deepfence also has added several community-inspired performance improvements and bugfixes, including better … More → The post Deepfence ThreatMapper 1.2.0 helps DevSecOps professionals identify critical vulnerabilities appeared first on Help Net Security.
http://news.poseidon-us.com/SHl8Wz

Deepfence ThreatMapper 1.2.0 helps DevSecOps professionals identify critical vulnerabilities

Deepfence released ThreatMapper 1.2.0, which offers significant feature upgrades since the first fully open source release of the project in October 2021. ThreatMapper 1.2.0 adds several in-demand features, including Attack Path Visualization, with a more sophisticated and representative calculation of the Most Exploitable Vulnerabilities, support for discovering and scanning AWS Fargate workloads for vulnerabilities, ARM support, and support for integration with Google Chronicle. Deepfence also has added several community-inspired performance improvements and bugfixes, including better … More → The post Deepfence ThreatMapper 1.2.0 helps DevSecOps professionals identify critical vulnerabilities appeared first on Help Net Security.
http://news.poseidon-us.com/SHl8Wz

Red vs. blue vs. purple teams: How to run an effective exercise

In the arsenal of cybersecurity defenses is the exercise that goes by the name of red team/blue team simulated attack. These simulations are designed to closely mimic real-world conditions. For example, one red team member might take on the role of an employee clicking on a phishing link that deposits malware on the network. The defending team members must then find this malware before it spreads across their network and infects web servers and other applications. To make things more realistic, the simulation replays real network traffic to obscure the attacks, just like in the real world. Let’s talk about the red and blue designations. Red team members usually play the role of attackers and try to overcome security protocols. They use the same tools and techniques that attackers use, similar to how penetration testers operate but on a much broader scale. To read this article in full, please click here
http://news.poseidon-us.com/SHhXLn