Hot stuff

How to set up and speed up Amazon S3 Replication for cross-region data replication

How to set up and speed up Amazon S3 Replication for cross-region data replication 21/09/2023 at 07:31 By Help Net Security Amazon S3 is a simple cloud storage solution enabling effortless storage and retrieval of large amounts of data from different geographies. It’s engineered for scalability, durability, and security, making it a popular option for […]

React to this headline:

Loading spinner

How to set up and speed up Amazon S3 Replication for cross-region data replication Read More »

How companies can take control of their cybersecurity

How companies can take control of their cybersecurity 21/09/2023 at 07:17 By Mirko Zorz In this Help Net Security interview, Baya Lonqueux, CEO at Reciproc-IT, discusses the evolving cybersecurity landscape and the essential skillsets needed for teams working in this field. The interview highlights the shift from technical expertise to a focus on organizational and

React to this headline:

Loading spinner

How companies can take control of their cybersecurity Read More »

Shadow IT: Security policies may be a problem

Shadow IT: Security policies may be a problem 20/09/2023 at 08:23 By Zeljka Zorz 3 out of 4 workers use personal (and often unmanaged) phones and laptops for work and nearly half of companies let unmanaged devices access protected resources, a recent report by Kolide and Dimensional Research has revealed. When asked why they use

React to this headline:

Loading spinner

Shadow IT: Security policies may be a problem Read More »

What AppSec and developers working in cloud-native environments need to know

What AppSec and developers working in cloud-native environments need to know 20/09/2023 at 08:05 By Help Net Security All enterprise organizations are, in essence, software publishers, regardless of their industry. This is because every enterprise relies on custom software applications for managing internal processes, interacting with customers, or analyzing data, making them creators and distributors

React to this headline:

Loading spinner

What AppSec and developers working in cloud-native environments need to know Read More »

18 free Microsoft Azure cybersecurity resources you should check out

18 free Microsoft Azure cybersecurity resources you should check out 20/09/2023 at 07:33 By Help Net Security Far exceeding a traditional public cloud platform, Azure is a comprehensive suite of over 200 products and cloud services engineered to solve current challenges and pave the way for the future. Whether you’re looking to build, run, or

React to this headline:

Loading spinner

18 free Microsoft Azure cybersecurity resources you should check out Read More »

Never use your master password as a password on other accounts

Never use your master password as a password on other accounts 19/09/2023 at 08:33 By Helga Labus One in three Americans now use password managers, up from one in five in 2022, according to an online poll by Security.org that quizzed 1,051 American adults on how they use passwords and password managers. How users choose

React to this headline:

Loading spinner

Never use your master password as a password on other accounts Read More »

Balancing budget and system security: Approaches to risk tolerance

Balancing budget and system security: Approaches to risk tolerance 19/09/2023 at 08:16 By Help Net Security Data breaches are a dime a dozen. Although it’s easy to look at that statement negatively, the positive viewpoint is that, as a result, cybersecurity professionals have plenty of learning moments. Learning what went wrong and why can be

React to this headline:

Loading spinner

Balancing budget and system security: Approaches to risk tolerance Read More »

An inside look at NetSPI’s impressive Breach and Attack Simulation platform

An inside look at NetSPI’s impressive Breach and Attack Simulation platform 19/09/2023 at 08:02 By Mirko Zorz In this Help Net Security interview, Scott Sutherland, VP of Research at NetSPI, delves into the intricacies of their Breach and Attack Simulation (BAS) platform and discusses how it offers unique features – from customizable procedures to advanced

React to this headline:

Loading spinner

An inside look at NetSPI’s impressive Breach and Attack Simulation platform Read More »

Avoiding domain security risks when taking your business online

Avoiding domain security risks when taking your business online 19/09/2023 at 07:06 By Help Net Security Unfortunately, as available domain extensions increase in variety (and uniqueness), so do security risks. In this Help Net Security video, Prudence Malinki, Head of Industry Relations at Markmonitor, discusses best practices enterprises should abide by when kickstarting their online

React to this headline:

Loading spinner

Avoiding domain security risks when taking your business online Read More »

Kubernetes vulnerabilities allows RCE on Windows endpoints (CVE-2023-3676)

Kubernetes vulnerabilities allows RCE on Windows endpoints (CVE-2023-3676) 18/09/2023 at 14:32 By Helga Labus Three high-severity Kubernetes vulnerabilities (CVE-2023-3676, CVE-2023-3893, CVE-2023-3955) could allow attackers to execute code remotely and gain control over all Windows nodes in the Kubernetes cluster. About the vulnerabilities CVE-2023-3676, discovered by Akamai researcher Tomer Peled, is a command injection vulnerability that

React to this headline:

Loading spinner

Kubernetes vulnerabilities allows RCE on Windows endpoints (CVE-2023-3676) Read More »

Industrial cybersecurity giant Dragos rakes in new funding, sets sights on global expansion

Industrial cybersecurity giant Dragos rakes in new funding, sets sights on global expansion 18/09/2023 at 12:32 By Mirko Zorz Today, Dragos revealed that it has secured a $74 million Series D extension funding round, spearheaded by the strategic operating and investment firm WestCap. The funding extension comes when global governments and infrastructure providers increasingly acknowledge

React to this headline:

Loading spinner

Industrial cybersecurity giant Dragos rakes in new funding, sets sights on global expansion Read More »

The hidden dangers of low-value data

The hidden dangers of low-value data 18/09/2023 at 08:05 By Help Net Security In this Help Net Security video, Terry Ray, SVP Data Security and Field CTO at Imperva, warns organizations to stop ignoring low-value data – as criminals use it as a place to live, watch, and wait for the perfect moment to steal

React to this headline:

Loading spinner

The hidden dangers of low-value data Read More »

Modernizing fraud prevention with machine learning

Modernizing fraud prevention with machine learning 15/09/2023 at 08:33 By Help Net Security The number of digital transactions has skyrocketed. As consumers continue to spend and interact online, they have growing expectations for security and identity verification. As fraudsters become savvier and more opportunistic, there’s an increased need for businesses to protect customers from fraud

React to this headline:

Loading spinner

Modernizing fraud prevention with machine learning Read More »

Attackers hit software firm Retool to get to crypto companies and assets

Attackers hit software firm Retool to get to crypto companies and assets 14/09/2023 at 18:17 By Zeljka Zorz Retool, the company behind the popular development platform for building internal business software, has suffered a breach that allowed attackers to access and take over accounts of 27 cloud customers, all in the crypto industry. According to

React to this headline:

Loading spinner

Attackers hit software firm Retool to get to crypto companies and assets Read More »

Attackers use fallback ransomware if LockBit gets blocked

Attackers use fallback ransomware if LockBit gets blocked 14/09/2023 at 13:15 By Zeljka Zorz Your security solutions might stave off a LockBit infection, but you might still end up with encrypted files: according to Symantec’s threat researchers, some affiliates are using the 3AM ransomware as a fallback option in case LockBit gets flagged and blocked.

React to this headline:

Loading spinner

Attackers use fallback ransomware if LockBit gets blocked Read More »

Great security training is a real challenge

Great security training is a real challenge 14/09/2023 at 07:31 By Help Net Security All employees need security training, yet it’s generally a resented afterthought. A variety of studies over years show that human error is generally felt to be the largest vulnerability in organizations. For technology companies like SaaS providers, who also need to

React to this headline:

Loading spinner

Great security training is a real challenge Read More »

The critical role of authorization in safeguarding financial institutions

The critical role of authorization in safeguarding financial institutions 14/09/2023 at 07:01 By Help Net Security According to a recent Cost of Data Breach report, the financial industry has the second highest average cost for a data breach, making the value well worth financial institutions investing more into authorization. In this Help Net Security video,

React to this headline:

Loading spinner

The critical role of authorization in safeguarding financial institutions Read More »

MetaStealer malware is targeting enterprise macOS users

MetaStealer malware is targeting enterprise macOS users 13/09/2023 at 14:32 By Helga Labus Enterprise macOS users are being targeted by attackers slinging new information-stealing malware dubbed MetaStealer. The MetaStealer malware MetaStealer is delivered within malicious disk image format (.dmg) files. The names of the files – such as Advertising terms of reference (MacOS presentation).dmg and

React to this headline:

Loading spinner

MetaStealer malware is targeting enterprise macOS users Read More »

Microsoft Teams phishing: Enterprises targeted by ransomware access broker

Microsoft Teams phishing: Enterprises targeted by ransomware access broker 13/09/2023 at 12:16 By Zeljka Zorz A threat actor known for providing ransomware gangs with initial access to enterprise systems has began phishing employees via Microsoft Teams. “For this activity, Storm-0324 most likely relies on a publicly available tool called TeamsPhisher,” Microsoft threat researchers noted. About

React to this headline:

Loading spinner

Microsoft Teams phishing: Enterprises targeted by ransomware access broker Read More »

Serial cybersecurity founders get back in the game

Serial cybersecurity founders get back in the game 13/09/2023 at 07:32 By Help Net Security “I didn’t really have a choice,” says Ben Bernstein, the former CEO and co-founder of Twistlock (acquired by Palo Alto Networks in 2019) and the CEO and co-founder of a new cybersecurity startup that is still in stealth. “Building a

React to this headline:

Loading spinner

Serial cybersecurity founders get back in the game Read More »

Scroll to Top