Entries by Markus Feilner

German BSI warns of vulnerability in VMware ESXi

A new wave of ransomware attacks has been threatening numerous servers in Europe. The attacks focus on the hypervisors in VMware’s virtualization server ESXi. Patches are available, Greenbone’s products can protect and help to find the vulnerability. The German BSI explicitly warns of the vulnerability and in its latest information on the security situation speaks […]

More Docker compliance tests in Greenbones Vulnerability Management

For almost two years, Greenbone has been adding more and more tests from the recommendations of the Center for Internet Security (CIS) in its security feed. Among the newest ones are benchmarks for the container management solution Docker. Docker is one of the most common container technologies in enterprise environments. Its increasing popularity within DevOps […]

ENISA study: Public sector most at risk

In the 10th edition of its ENISA Threat Landscape (ETL), the EU’s cybersecurity agency explicitly warns of increasing threats from hacking attacks on public sector entities. Around a quarter of all security related incidents target administrative or government entities, the ENISA study reports – making the public sector nearly twice as much at risk as […]

GDPR compliant Vulnerability Management

The EuGH ruling known as “Schrems-II” on secure data exchange with the US has left a lot of legal uncertainty: Companies urgently need to adapt their contracts and a new solution is not in sight. It is time to switch to modern, data protection compliant and legally secure tools – such as the Greenbone Cloud […]

ViPNet, Protelion: Greenbone enables to check the status

ViPNet Client integrated into Greenbone Vulnerability Management According to a report by ZDF Magazin Royale last Friday, there are growing fears that the VPN software “VIPNET”, from the company Protelion, a subsidiary of the Russian cybersecurity company O.A.O.Infotecs, could have security vulnerabilities. It is feared that the software, which Protelion distributes, could allow the Russian […]

,

New zero-day exploit in Microsoft Exchange Server – Greenbone Enterprise Feed offers protection

We have developed a remote test for the Microsoft Exchange Server ProxyNotShell vulnerability GTSC2022. Update from 2022-10-13: The vulnerability still exists after the October patchday on Tuesday. The blog post of Microsoft’s Security Response Center is continuously updated by the company, the last entry is from October 08. The mentioned zero-day exploit in Microsoft Exchange […]

Docker Container for Greenbone Community Edition

Greenbone is stepping up its commitment to open source and the community edition of its vulnerability management software. In addition to the open source code on Github, Greenbone now also provides pre-configured and tested Docker containers. Official containers from the manufacturer itself The Greenbone Community Containers are regularly built automatically and are also available for […]

Greenbone launches new Community Portal

Greenbone, the global leader in open source vulnerability management solutions, has launched a community portal for its user and developer community, making the extensive information available for community editions clearer and easier to access. Who is the portal for? At community.greenbone.net, vulnerability management experts invite users, developers and all IT professionals who are professionally involved […]

,

Notus is live! New vulnerability scanner from Greenbone

Greenbone, a world leader in open source vulnerability management software, has released its latest scanner, Notus. “With Notus, a milestone for the performance of extensive comparisons of software versions has been created in recent years,” explains CIO Elmar Geese. With Notus, Greenbone is also responding to customer requests for better performance in version checks. Whether […]

Supply Chains in Open-Source Software

Open source is unceasingly on the rise among the vast majority of companies, software manufacturers and providers. However, this triumphant advance is also increasing the importance of monitoring the supply chain of the software used, which third parties have developed in accordance with open-source traditions. But not everyone using open-source software follows all the tried […]