VMware Product Release Tracker (vTracker)

VMware Product Release Tracker (vTracker)

This page contains a list of products released by VMware. vTracker is automatically updated when new products are available to download (GA) at vmware.com. If you want to get notified about new VMware Products, subscribe to the RSS Feed. You can also use the JSON export to build your own tool. Feel free to comment when you have any feature requests. 2025-02-18VMware Tools 13.0.0 [Release Notes] 2025-02-13VMware Cloud Director Availability 4.7.3.1 [Release Notes] 2025-01-31VMware Cloud…

Read More

Rethinking the enterprise network backbone

Rethinking the enterprise network backbone

Multiple business imperatives are driving CIOs to re-examine and re-invent their approach to network infrastructure, including the mission critical backbone that supports highly complex, bandwidth-intensive, multi-cloud environments. One emerging alternative: backbone-as-a-service (BBaaS) offerings. As with other “as-a-service” offerings, the idea behind BBaaS is to simplify the process of providing secure, high-performance connectivity across geographic regions. It’s especially attractive as an alternative to MPLS, promising to do for wide-area backbones what the cloud did for compute,…

Read More

Which risk assessment frameworks do you use?

Which risk assessment frameworks do you use?

Risk assessment is more than a box-checking exercise. The right framework is an essential part of proactive risk management designed to protect against data breaches or prevent non-compliance with regulations. CSO recently explored six popular risk assessment frameworks, including COBIT, NIST Risk Management Framework, and ISO/IEC 27001. Want to know what your peers are using and how they approach risk management? Register now for the IT Governance, Risk & Compliance summit, a virtual conference taking…

Read More

CISA and FBI Warn Against Buffer Overflow Vulnerabilities

CISA and FBI Warn Against Buffer Overflow Vulnerabilities

A new alert from the US Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) has outlined strategies to eliminate buffer overflow vulnerabilities in software. Part of the Secure by Design Alert series, the report published on Wednesday emphasizes using memory-safe programming languages and other secure development practices to prevent these defects, which are commonly exploited by malicious actors. Buffer overflow vulnerabilities occur when software improperly accesses memory, leading to risks such as data corruption,…

Read More

US Coast Guard Urged to Strengthen Cybersecurity Amid $2B Daily Port Risk

US Coast Guard Urged to Strengthen Cybersecurity Amid B Daily Port Risk

The US Coast Guard has been urged to improve the cybersecurity infrastructure of the Maritime Transportation System (MTS), which includes ports, waterways, and vessels essential for transporting over $5.4 trillion worth of goods annually. The Government Accountability Office (GAO) has warned in a report published this week that America’s maritime transportation system lacks a proper cybersecurity strategy to protect itself, and does not have reliable access to data related to vulnerabilities and past attacks. The…

Read More

RASP (Runtime Application Self-Protection) in Mobile Application Security: A Strategic Imperative for the Modern Threat Landscape

RASP (Runtime Application Self-Protection) in Mobile Application Security: A Strategic Imperative for the Modern Threat Landscape

Introduction The mobile application landscape is more dynamic and challenging than ever, with businesses increasingly relying on mobile channels to drive customer engagement, streamline operations, and generate revenue. Yet, this rapid growth has been paralleled by a surge in sophisticated cyber threats, making traditional security measures inadequate. Enter Runtime Application Self-Protection (RASP) a disruptive technology that offers an inside-out approach to securing mobile applications. This article examines the current standing of RASP within mobile app security, anticipates its…

Read More

Astaroth Phishing Kit Bypasses 2FA Using Reverse Proxy Techniques

Astaroth Phishing Kit Bypasses 2FA Using Reverse Proxy Techniques

A sophisticated new phishing tool dubbed “Astaroth” has emerged on cybercrime platforms, boasting advanced methods to bypass two-factor authentication (2FA). First advertised in January 2025, the kit employs session hijacking and real-time credential interception to compromise accounts on Gmail, Yahoo, Office 365 and other platforms. According to SlashNext researchers, Astaroth operates through an evilginx-style reverse proxy, placing itself between users and legitimate login pages.  This allows it to capture usernames, passwords, 2FA tokens and session cookies without…

Read More

SAP aims to unify data for AI, analytics with new Business Data Cloud

SAP aims to unify data for AI, analytics with new Business Data Cloud

Getting ready for agentic wars? Analysts also said that SAP’s strategy to champion BDC as the foundational data layer is another step towards getting ready for the agentic wars — a phase where rival vendors such as Salesforce, Oracle, Microsoft, Workday, and ServiceNow, among others will try to get a majority share of enterprises’ expenditure. “Enterprises are already using multiple products across their businesses. If an enterprise uses both Salesforce and SAP across different departments,…

Read More

Romance Baiting Losses Surge 40% Annually

Romance Baiting Losses Surge 40% Annually

Losses to romance baiting, or pig butchering, scams increased 40% year-on-year (YoY) in 2024 to comprise a third of total crypto fraud revenue, according to Chainalysis. A day before Valentine’s Day, the blockchain analytics company revealed the darker side of dating apps, in the latest chapter of its 2025 Crypto Crime Report. Romance baiting typically occurs when vulnerable individuals are approached on dating sites, before being groomed by scammers and then persuaded to invest in…

Read More

Deciphering End User Data Access Patterns is Key to a Strong SaaS Security Posture

Deciphering End User Data Access Patterns is Key to a Strong SaaS Security Posture

It’s all about patterns. Long before cybersecurity was on anyone’s radar, defensive intelligence – like catching an enemy spy in your ranks – was about being able to recognize patterns and interpret their meaning correctly. Security’s reliance on pattern recognition and interpretation is no less true in the age of cyber. And nowhere is it more true than in the world of SaaS. In SaaS, you are what you do. In the SaaS environment, identity…

Read More
1 44 45 46 47 48 2,650