News

New infosec products of the week: April 5, 2024

New infosec products of the week: April 5, 2024 2024-04-05 at 06:01 By Help Net Security Here’s a look at the most interesting products from the past week, featuring releases from Fastly, LogRhythm, Owl Cyber Defense Solutions, and TrueMedia.org. Owl Talon 3 provides hardware-enforced, one-way data transfers Owl Cyber Defense Solutions launched next generation of […]

React to this headline:

Loading spinner

New infosec products of the week: April 5, 2024 Read More »

Omni Hotels suffer prolonged IT outage due to cyberattack

Omni Hotels suffer prolonged IT outage due to cyberattack 2024-04-04 at 17:32 By Zeljka Zorz Texas-based Omni Hotels & Resorts has been responding to a cyberattack that started last Friday, which resulted in the unavailability of many of its IT systems. According to people staying at some of the 50 properties the company operates across

React to this headline:

Loading spinner

Omni Hotels suffer prolonged IT outage due to cyberattack Read More »

Ivanti vows to transform its security operating model, reveals new vulnerabilities

Ivanti vows to transform its security operating model, reveals new vulnerabilities 2024-04-04 at 16:02 By Zeljka Zorz Ivanti has released patches for new DoS vulnerabilities affecting Ivanti Connect Secure (SSL VPN solution) and Ivanti Policy Secure (NAC solution), some of which could also lead to execution of arbitrary code or information disclosure. Also, three months

React to this headline:

Loading spinner

Ivanti vows to transform its security operating model, reveals new vulnerabilities Read More »

Six steps for security and compliance in AI-enabled low-code/no-code development

Six steps for security and compliance in AI-enabled low-code/no-code development 2024-04-04 at 08:02 By Help Net Security AI is quickly transforming how individuals create their own apps, copilots, and automations. This is enabling organizations to improve output and increase efficiency—all without adding to the burden of IT and the help desk. But while this transformation

React to this headline:

Loading spinner

Six steps for security and compliance in AI-enabled low-code/no-code development Read More »

Mantis: Open-source framework that automates asset discovery, reconnaissance, scanning

Mantis: Open-source framework that automates asset discovery, reconnaissance, scanning 2024-04-04 at 07:31 By Mirko Zorz Mantis is an open-source command-line framework that automates asset discovery, reconnaissance, and scanning. You input a top-level domain, and it identifies associated assets, such as subdomains and certificates. Mantis features The framework conducts reconnaissance on active assets and completes its

React to this headline:

Loading spinner

Mantis: Open-source framework that automates asset discovery, reconnaissance, scanning Read More »

Healthcare’s cyber resilience under siege as attacks multiply

Healthcare’s cyber resilience under siege as attacks multiply 2024-04-04 at 07:01 By Mirko Zorz In this Help Net Security interview, Eric Demers, CEO of Madaket Health, discusses prevalent cyber threats targeting healthcare organizations. He highlights challenges in protecting patient data due to infrastructure limitations and the role of employee awareness in preventing insider threats. Demers

React to this headline:

Loading spinner

Healthcare’s cyber resilience under siege as attacks multiply Read More »

76% of consumers don’t see themselves as cybercrime targets

76% of consumers don’t see themselves as cybercrime targets 2024-04-04 at 06:01 By Help Net Security 67% of consumers across the globe are concerned about the security and privacy of AI, according to Bitdefender survey. AI uses personal data to feed its machine learning algorithms, and the rising amount has raised serious concerns about data

React to this headline:

Loading spinner

76% of consumers don’t see themselves as cybercrime targets Read More »

A “cascade” of errors let Chinese hackers into US government inboxes

A “cascade” of errors let Chinese hackers into US government inboxes 2024-04-03 at 16:46 By Zeljka Zorz Microsoft still doesn’t known how Storm-0558 attackers managed to steal the Microsoft Services Account cryptographic key they used to forge authentication tokens needed to access email accounts belonging to US government officials. “The stolen 2016 MSA key in

React to this headline:

Loading spinner

A “cascade” of errors let Chinese hackers into US government inboxes Read More »

NVD: NIST is working on longer-term solutions

NVD: NIST is working on longer-term solutions 2024-04-03 at 13:17 By Zeljka Zorz The recent conspicuous faltering of the National Vulnerability Database (NVD) is “based on a variety of factors, including an increase in software and, therefore, vulnerabilities, as well as a change in interagency support,” says the U.S. National Institute of Standards and Technology

React to this headline:

Loading spinner

NVD: NIST is working on longer-term solutions Read More »

Owl Talon 3 provides hardware-enforced, one-way data transfers

Owl Talon 3 provides hardware-enforced, one-way data transfers 2024-04-03 at 12:01 By Industry News Owl Cyber Defense Solutions launched next generation of their flagship data diode software platform, Owl Talon 3. This new release represents the first in a planned series of leaps forward for Owl’s hardware-enforced one-way data transfer technology. With an all-new user

React to this headline:

Loading spinner

Owl Talon 3 provides hardware-enforced, one-way data transfers Read More »

How Google plans to make stolen session cookies worthless for attackers

How Google plans to make stolen session cookies worthless for attackers 2024-04-03 at 08:31 By Zeljka Zorz Google is working on a new security feature for Chrome called Device Bound Session Credentials (DBSC), meant to prevent attackers from using stolen session cookies to gain access user accounts. Session (i.e., authentication) cookies are stored by browsers

React to this headline:

Loading spinner

How Google plans to make stolen session cookies worthless for attackers Read More »

Location tracking and the battle for digital privacy

Location tracking and the battle for digital privacy 2024-04-03 at 08:01 By Help Net Security While some online privacy issues can be subtle and difficult to understand, location tracking is very simple – and very scary. Perhaps nothing reveals more about who we are and what we do than a detailed map of all the

React to this headline:

Loading spinner

Location tracking and the battle for digital privacy Read More »

Cybersecurity jobs available right now: April 3, 2024

Cybersecurity jobs available right now: April 3, 2024 2024-04-03 at 07:31 By Mirko Zorz Cyber Security Manager Charterhouse Middle East | UAE | On-site – View job details The Cyber Security Manager will identify and address potential security issues, define access privileges, implement control structures, and conduct periodic audits. In addition, you’ll also contribute to

React to this headline:

Loading spinner

Cybersecurity jobs available right now: April 3, 2024 Read More »

Cyber attacks on critical infrastructure show advanced tactics and new capabilities

Cyber attacks on critical infrastructure show advanced tactics and new capabilities 2024-04-03 at 07:01 By Mirko Zorz In this Help Net Security interview, Marty Edwards, Deputy CTO OT/IoT at Tenable, discusses the impact of geopolitical tensions on cyber attacks targeting critical infrastructure. Edwards highlights the need for collaborative efforts between policymakers, government agencies, and the

React to this headline:

Loading spinner

Cyber attacks on critical infrastructure show advanced tactics and new capabilities Read More »

AT&T data leaked: 73 million customers affected

AT&T data leaked: 73 million customers affected 2024-04-02 at 15:31 By Zeljka Zorz AT&T has confirmed that the data set leaked on the dark web some two weeks ago does, indeed, contain “AT&T data-specific fields”. The company is reaching out to affected customers and offering credit monitoring services. What type of data has been leaked?

React to this headline:

Loading spinner

AT&T data leaked: 73 million customers affected Read More »

What the ID of tomorrow may look like

What the ID of tomorrow may look like 2024-04-02 at 08:01 By Help Net Security Few joys remain untouched by the necessity of identity verification. With its ubiquitous presence, the call for heightened security, improved accessibility, and seamless authentication resonates loudly for businesses and individuals alike. In response, a tool, or perhaps a reinvented vision

React to this headline:

Loading spinner

What the ID of tomorrow may look like Read More »

Cloud Active Defense: Open-source cloud protection

Cloud Active Defense: Open-source cloud protection 2024-04-02 at 07:31 By Mirko Zorz Cloud Active Defense is an open-source solution that integrates decoys into cloud infrastructure. It creates a dilemma for attackers: risk attacking and being detected immediately, or avoid the traps and reduce their effectiveness. Anyone, including small companies, can use it at no cost

React to this headline:

Loading spinner

Cloud Active Defense: Open-source cloud protection Read More »

73% brace for cybersecurity impact on business in the next year or two

73% brace for cybersecurity impact on business in the next year or two 2024-04-02 at 06:31 By Help Net Security Only 3% of organizations across the globe have the ‘mature’ level of readiness needed to be resilient against modern cybersecurity risks, according to Cisco. The 2024 Cisco Cybersecurity Readiness Index highlights that readiness is down

React to this headline:

Loading spinner

73% brace for cybersecurity impact on business in the next year or two Read More »

6 keys to navigating security and app development team tensions

6 keys to navigating security and app development team tensions 2024-04-02 at 06:01 By Help Net Security There will always be a natural tension between cybersecurity teams and developers. After all, it’s the developer’s role to “develop.” They want and are paid to create and ship new applications and features that help move the organization

React to this headline:

Loading spinner

6 keys to navigating security and app development team tensions Read More »

Trustwave Embarks on an Extended Partnership with Microsoft Copilot for Security

Trustwave Embarks on an Extended Partnership with Microsoft Copilot for Security 2024-04-02 at 01:01 By Trustwave today announced it will offer clients expert guidance on implementing and fully leveraging the just-released Microsoft Copilot for Security, a generative AI-powered security solution that helps increase the efficiency and capabilities of defenders to improve security outcomes. This article is

React to this headline:

Loading spinner

Trustwave Embarks on an Extended Partnership with Microsoft Copilot for Security Read More »

Scroll to Top