Entries by Greenbone AG

Peacocks and crows in IT security

A field report on open source, competition, enforcement of rights, and the question of how to defend a fair and sustainable open source ecosystem. Summary This report describes a real case of misuse of open source software using the example of OPENVAS, the open source vulnerability management system we developed. A market participant had systematically […]

Greenbone’s OPENVAS SCAN Now Covers Red Hat 10 and Rocky Linux 10 Security Advisories!

Operating system (OS) security updates are critical for maintaining a strong enterprise security posture. OS vulnerabilities in on-prem and cloud assets, fleets of staff workstations, development environments, container hosts, virtualization platforms, and edge infrastructure may offer an attacker the initial access they need to execute a costly cyber attack. Linux, especially Red Hat Enterprise Linux […]

Greenbone’s OPENVAS SCAN Now Supports the Proxmox VE Hypervisor

Users appreciate when software can easily integrate into their existing IT environment. For vendors, this means supporting a cross-platform mix of operating systems and infrastructure. We’re excited to expand our virtualization platform support, bringing Proxmox VE into our family of supported hypervisors. This addition enables more flexibility for deploying OPENVAS SCAN in diverse IT environments. […]

Greenbone’s Post-Quantum Cipher Analysis

Q-Day marks the moment when quantum computers will render classical cryptography standards obsolete. The risks posed by quantum computers demand a migration to Post Quantum Cryptography (PQC). Greenbone is proactively preparing for this future—upgrading our internal infrastructure, auditing partners, and enhancing the OPENVAS SECURITY INTELLIGENCE platform with upgraded detection and new auditing features. The goal […]

Greenbone Helps Defend Against Advanced Social Engineering Attacks

Urgency, fear, curiosity, trust, greed, sympathy — social engineering has been wildly successful in exploiting human emotions in cyber attacks. Social engineering attacks have been identified as a top root cause in a high number of breaches. Most breach analysis reports place social engineering among the top initial-access techniques. The recent rise in AI-enabled phishing […]

Greenbone Adds New Compliance Profiles for Huawei EulerOS

Greenbone is excited to announce new compliance policies for Huawei’s EulerOS and openEuler. These compliance policies are the result of close collaboration with Huawei to provide OPENVAS SCAN users with authenticated checks for over 200 key security controls. By thoroughly vetting security settings, defenders gain high degree security assurances and visibility into the security posture […]

Italy’s Cybersecurity Wake-Up Call: Why 2025 Is the Year Everything Changed

Cybersecurity has moved from boardroom buzzword to front-page reality in Italy this year. Walk into any conference room, attend any summit, or join any industry discussion, and you’ll hear the same urgent conversations: companies are under pressure from increasingly sophisticated cyber threats. However, there’s also something new happening – a wave of innovation and collaboration […]

Change in the Greenbone AG Executive Board

After many years at the helm of Greenbone, our co-founder, Dr Jan-Oliver Wagner, is stepping down from active operational management. We would like to thank Dr Wagner for his extraordinary commitment and all that he has achieved for Greenbone since its foundation.         The new CEO is Elmar Geese, who has been […]

OPENVAS B.V. Debuts at Cybersec Netherlands 2025 in Utrecht

Utrecht will be the central meeting point for the cybersecurity community on September 10 – 11, 2025. OPENVAS B.V. will make its first appearance at Cybersec Netherlands, marking an important milestone in expanding our local presence after establishing the Benelux office and fostering direct connections with customers and partners. The area is one of Europe’s […]

Salt Typhoon: Greenbone Covers All Vulnerabilities

On August 27, more than 20 security agencies published a Cybersecurity Advisory with the title “Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System”   Publishing authorities included: United States National Security Agency (NSA) United States Cybersecurity and Infrastructure Security Agency (CISA) United States Federal Bureau of Investigation (FBI) Germany Federal […]