News

CISOs and board members are finding a common language

CISOs and board members are finding a common language 16/10/2023 at 07:39 By Help Net Security 86% of CISOs believe generative AI will alleviate skills gaps and talent shortages on the security team, filling labor-intensive and time-consuming security functions and freeing up security professionals to be more strategic, according to Splunk. 35% report using generative […]

React to this headline:

Loading spinner

CISOs and board members are finding a common language Read More »

Inadequate IoT protection can be a costly mistake

Inadequate IoT protection can be a costly mistake 16/10/2023 at 06:34 By Help Net Security 97% of organizations are struggling to secure their IoT and connected products to some degree, according to Keyfactor. The research survey also found that 98% of organizations experienced certificate outages in the last 12 months, costing an average of over

React to this headline:

Loading spinner

Inadequate IoT protection can be a costly mistake Read More »

Week in review: Patched curl and libcurl vulnerability, 15 free M365 security training modules

Week in review: Patched curl and libcurl vulnerability, 15 free M365 security training modules 15/10/2023 at 11:06 By Help Net Security Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Turning military veterans into cybersecurity experts In this Help Net Security interview, James Murphy, the Director of the TechVets

React to this headline:

Loading spinner

Week in review: Patched curl and libcurl vulnerability, 15 free M365 security training modules Read More »

New infosec products of the week: October 13, 2023

New infosec products of the week: October 13, 2023 13/10/2023 at 07:46 By Help Net Security Here’s a look at the most interesting products from the past week, featuring releases from Appdome, Flexxon, Fortanix, Fortinet, SailPoint, and Vanta. Flexxon Xsign protects sensitive data reserved only for authorized personnel With the use of the Xsign hardware

React to this headline:

Loading spinner

New infosec products of the week: October 13, 2023 Read More »

Quantum risk is real now: How to navigate the evolving data harvesting threat

Quantum risk is real now: How to navigate the evolving data harvesting threat 13/10/2023 at 07:32 By Help Net Security In an era where data security is paramount, the recent revelations about firmware backdoors implanted by Chinese government-backed hackers serve as a stark reminder of the evolving threat landscape. BlackTech is infiltrating routers to gain

React to this headline:

Loading spinner

Quantum risk is real now: How to navigate the evolving data harvesting threat Read More »

Stronger ransomware protection finally pays off

Stronger ransomware protection finally pays off 13/10/2023 at 07:01 By Help Net Security 60% of companies are ‘very’ to ‘extremely’ concerned about ransomware attacks, according to latest research from Hornetsecurity. Businesses acknowledge ransomware risk Hornetsecurity revealed that 92.5% businesses are aware of ransomware’s potential for negative impact. Still, just 54% of respondents said their leadership

React to this headline:

Loading spinner

Stronger ransomware protection finally pays off Read More »

AI-enabled bots can solve CAPTCHAs faster than humans

AI-enabled bots can solve CAPTCHAs faster than humans 13/10/2023 at 06:02 By Help Net Security Companies are losing revenue in the fight against malicious bot attacks, according to survey by Kasada. Despite spending millions of dollars on traditional bot management solutions, companies are still financially impacted by bot attacks. 38% of respondents estimate that a

React to this headline:

Loading spinner

AI-enabled bots can solve CAPTCHAs faster than humans Read More »

Microsoft Defender can automatically contain compromised user accounts

Microsoft Defender can automatically contain compromised user accounts 12/10/2023 at 15:32 By Helga Labus The “contain user” feature select Microsoft Defender for Endpoint customers have been trying out since November 2022 is now available to a wider pool of organizations, Microsoft has announced. The feature aims to help organizations disrupt human-operated attacks like ransomware, business

React to this headline:

Loading spinner

Microsoft Defender can automatically contain compromised user accounts Read More »

Sic Permission Slip on data brokers that use your data

Sic Permission Slip on data brokers that use your data 12/10/2023 at 08:31 By Helga Labus Permission Slip, an iPhone and Android app developed by Consumer Reports, helps users ask companies and data brokers to stop sharing their personal data and/or delete it. The Permission Slip app (Source: Consumer Reports) US consumer data privacy laws

React to this headline:

Loading spinner

Sic Permission Slip on data brokers that use your data Read More »

Keeping up with the demands of the cyber insurance market

Keeping up with the demands of the cyber insurance market 12/10/2023 at 08:01 By Help Net Security Cyber insurance has been around longer than most of us think. When American International Group (AIG) launched the first cyber insurance policy in 1997, it stepped into completely unknown territory to gain market share. Now, 26 years later,

React to this headline:

Loading spinner

Keeping up with the demands of the cyber insurance market Read More »

Unmasking the limitations of yearly penetration tests

Unmasking the limitations of yearly penetration tests 12/10/2023 at 07:31 By Mirko Zorz In this Help Net Security interview, Charles d’Hondt, Head of Operations, Ambionics Security, talks about the necessity of implementing continuous penetration testing because yearly ones are not enough. They leave blind spots and cannot match the security needs of regular releases and

React to this headline:

Loading spinner

Unmasking the limitations of yearly penetration tests Read More »

Yeti: Open, distributed, threat intelligence repository

Yeti: Open, distributed, threat intelligence repository 12/10/2023 at 07:01 By Help Net Security Yeti serves as a unified platform to consolidate observables, indicators of compromise, TTPs, and threat-related knowledge. It enhances observables automatically, such as domain resolution and IP geolocation, saving you the effort. With its user-friendly interface built on Bootstrap and a machine-friendly web

React to this headline:

Loading spinner

Yeti: Open, distributed, threat intelligence repository Read More »

As biohacking evolves, how vulnerable are we to cyber threats?

As biohacking evolves, how vulnerable are we to cyber threats? 12/10/2023 at 07:01 By Help Net Security Can our bodies be hacked? The answer may be yes, in that anyone can implant a chip under the skin and these devices do not usually use secure technologies, according to Entelgy. However, despite more than a decade

React to this headline:

Loading spinner

As biohacking evolves, how vulnerable are we to cyber threats? Read More »

Cybersecurity should be a business priority for CEOs

Cybersecurity should be a business priority for CEOs 12/10/2023 at 06:02 By Help Net Security 74% of CEOs are concerned about their organizations’ ability to avert or minimize damage to the business from a cyberattack – even though 96% of CEOs said that cybersecurity is critical to organizational growth and stability, according to Accenture. CEOs

React to this headline:

Loading spinner

Cybersecurity should be a business priority for CEOs Read More »

Israel Hospital Uses Facial Recognition To Identify Dead And Wounded From Hamas War

Israel Hospital Uses Facial Recognition To Identify Dead And Wounded From Hamas War 11/10/2023 at 19:18 By Thomas Brewster, Forbes Staff When family members send in photos of their missing loved ones, Corsight AI’s technology checks for matches against images of patients. This article is an excerpt from Forbes – Cybersecurity View Original Source React

React to this headline:

Loading spinner

Israel Hospital Uses Facial Recognition To Identify Dead And Wounded From Hamas War Read More »

Critical Atlassian Confluence vulnerability exploited by state-backed threat actor

Critical Atlassian Confluence vulnerability exploited by state-backed threat actor 11/10/2023 at 14:18 By Helga Labus A critical flaw in Atlassian Confluence Data Center and Server (CVE-2023-22515) has been exploited by a state-backed threat actor, Microsoft’s threat analysts have pinpointed. About the vulnerability CVE-2023-22515 was initially classified as a critical privilege escalation vulnerability affecting Confluence Data

React to this headline:

Loading spinner

Critical Atlassian Confluence vulnerability exploited by state-backed threat actor Read More »

Curl project squashes high-severity bug in omnipresent libcurl library (CVE-2023-38545)

Curl project squashes high-severity bug in omnipresent libcurl library (CVE-2023-38545) 11/10/2023 at 13:31 By Zeljka Zorz Curl v8.4.0 is out, and fixes – among other things – a high-severity SOCKS5 heap buffer overflow vulnerability (CVE-2023-38545). Appropriate patches for some older curl versions have been released, too. Preparation for the security updates A little over a

React to this headline:

Loading spinner

Curl project squashes high-severity bug in omnipresent libcurl library (CVE-2023-38545) Read More »

15 free Microsoft 365 security training modules worth your time

15 free Microsoft 365 security training modules worth your time 11/10/2023 at 07:32 By Help Net Security Microsoft 365 is a cloud-based productivity suite. Beyond just tools like Word and Excel, it integrates productivity applications with cloud functionalities, device administration, and enhanced security, all within a unified experience. Managing Microsoft 365 can be difficult for

React to this headline:

Loading spinner

15 free Microsoft 365 security training modules worth your time Read More »

Endpoint malware attacks decline as campaigns spread wider

Endpoint malware attacks decline as campaigns spread wider 11/10/2023 at 06:31 By Help Net Security In Q2 2023, 95% of malware now arrives over encrypted connections, endpoint malware volumes are decreasing despite campaigns growing more widespread, ransomware detections are declining amid a rise in double-extortion attacks, and older software vulnerabilities persist as popular targets for

React to this headline:

Loading spinner

Endpoint malware attacks decline as campaigns spread wider Read More »

Cloud security and functionality: Don’t settle for just one

Cloud security and functionality: Don’t settle for just one 11/10/2023 at 06:02 By Help Net Security Cloud security is important to you, but that doesn’t mean you’re willing to trade security for functionality. You need security to work for you. Whatever cloud security resources you’re using must be compatible with the services you use to

React to this headline:

Loading spinner

Cloud security and functionality: Don’t settle for just one Read More »

Scroll to Top