News

Unlocking the value of AI-powered identity security

Unlocking the value of AI-powered identity security 2024-10-16 at 06:01 By Help Net Security While most organizations are still in the early horizons of their identity security journey, those who achieve maturity are seeing disproportionately higher returns for every dollar spent​, according to SailPoint. Identity security adoption still in early stages The value of identity […]

React to this headline:

Loading spinner

Unlocking the value of AI-powered identity security Read More »

Attackers deploying red teaming tool for EDR evasion

Attackers deploying red teaming tool for EDR evasion 2024-10-15 at 17:16 By Zeljka Zorz Threat actors are leveraging the open-source EDRSilencer tool to evade endpoint detection and response systems, Trend Micro researchers have noticed. About EDRSilencer The software, which is intended for red teaming, is being abused to “silence” EDR solutions. It works by leveraging

React to this headline:

Loading spinner

Attackers deploying red teaming tool for EDR evasion Read More »

87,000+ Fortinet devices still open to attack, are yours among them? (CVE-2024-23113)

87,000+ Fortinet devices still open to attack, are yours among them? (CVE-2024-23113) 2024-10-15 at 14:49 By Zeljka Zorz Last week, CISA added CVE-2024-23113 – a critical vulnerability that allows unauthenticated remote code/command execution on unpatched Fortinet FortiGate firewalls – to its Known Exploited Vulnerabilities catalog, thus confirming that it’s being leveraged by attackers in the

React to this headline:

Loading spinner

87,000+ Fortinet devices still open to attack, are yours among them? (CVE-2024-23113) Read More »

The NHI management challenge: When employees leave

The NHI management challenge: When employees leave 2024-10-15 at 08:01 By Help Net Security An employee is exiting your organization. Regardless of the terms of departure, an ex-staffer has the potential when they leave or change roles to impact a wide range of non-human identities, digital credentials, and other secrets. Those secrets include the credentials

React to this headline:

Loading spinner

The NHI management challenge: When employees leave Read More »

How nation-states exploit political instability to launch cyber operations

How nation-states exploit political instability to launch cyber operations 2024-10-15 at 07:37 By Mirko Zorz In this Help Net Security interview, Ismael Valenzuela, Vice President of Threat Research & Intelligence at BlackBerry, discusses the impact of geopolitical tensions on the frequency and sophistication of cyberattacks. He explains how nation-states and politically motivated groups exploit unrest

React to this headline:

Loading spinner

How nation-states exploit political instability to launch cyber operations Read More »

Data breaches trigger increase in cyber insurance claims

Data breaches trigger increase in cyber insurance claims 2024-10-15 at 06:31 By Help Net Security Cyber claims have continued their upwards trend over the past year, driven in large part by a rise in data and privacy breach incidents, according to Allianz. Cyber claims frequency exceeds €1 million The frequency of large cyber claims (>€1

React to this headline:

Loading spinner

Data breaches trigger increase in cyber insurance claims Read More »

How to create verification codes in Apple Passwords app

How to create verification codes in Apple Passwords app 2024-10-15 at 06:01 By Anamarija Pogorelec Starting with iOS 18, iPadOS 18, macOS Sequoia, and visionOS 2, the Apple Passwords app enables you to manage your passwords, passkeys, and verification codes. For websites and apps that support two-factor (2FA) or multi-factor authentication (MFA), the Passwords app

React to this headline:

Loading spinner

How to create verification codes in Apple Passwords app Read More »

The quantum dilemma: Game-changer or game-ender

The quantum dilemma: Game-changer or game-ender 2024-10-14 at 08:18 By Help Net Security If someone told you five years ago that you could pose questions to an AI agent about the most vexing issues in science and it could answer back swiftly and meaningfully, you would’ve thought they were joking. But AI has ushered in

React to this headline:

Loading spinner

The quantum dilemma: Game-changer or game-ender Read More »

CISOs’ strategies for managing a growing attack surface

CISOs’ strategies for managing a growing attack surface 2024-10-14 at 07:03 By Mirko Zorz In this Help Net Security interview, Rickard Carlsson, CEO at Detectify, discusses the evolution of attack surface management in the context of remote work and digital transformation. Carlsson highlights the challenges CISOs face today, including maintaining visibility and managing compliance in

React to this headline:

Loading spinner

CISOs’ strategies for managing a growing attack surface Read More »

CIOs want a platform that combines AI, networking, and security

CIOs want a platform that combines AI, networking, and security 2024-10-14 at 06:38 By Help Net Security While AI has captured the attention of the technology industry, the majority of CIOs and senior IT leaders are primarily focused on the convergence of networking and security, according to Extreme Networks. The survey, fielded in July and

React to this headline:

Loading spinner

CIOs want a platform that combines AI, networking, and security Read More »

CISSP and CompTIA Security+ lead as most desired security credentials

CISSP and CompTIA Security+ lead as most desired security credentials 2024-10-14 at 06:38 By Help Net Security 33.9% of tech professionals report a shortage of AI security skills, particularly around emerging vulnerabilities like prompt injection, according to O’Reilly. This highlights the need for specialized training as AI adoption continues to accelerate across industries. Critical skills

React to this headline:

Loading spinner

CISSP and CompTIA Security+ lead as most desired security credentials Read More »

Breaking down the numbers: Q3 2024 cybersecurity funding activity recap

Breaking down the numbers: Q3 2024 cybersecurity funding activity recap 2024-10-14 at 06:02 By Help Net Security We present a list of selected cybersecurity companies that received funding during the third quarter of 2024 (Q3 2024). Apono October | 15.5 million Apono has raised $15.5 million in a Series A funding led by New Era

React to this headline:

Loading spinner

Breaking down the numbers: Q3 2024 cybersecurity funding activity recap Read More »

Week in review: Microsoft fixes two exploited zero-days, SOC teams are losing trust in security tools

Week in review: Microsoft fixes two exploited zero-days, SOC teams are losing trust in security tools 2024-10-13 at 11:03 By Help Net Security Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft patches two zero-days exploited in the wild (CVE-2024-43573, CVE-2024-43572) For October 2024 Patch Tuesday, Microsoft has

React to this headline:

Loading spinner

Week in review: Microsoft fixes two exploited zero-days, SOC teams are losing trust in security tools Read More »

EU adopts Cyber Resilience Act to secure connected products

EU adopts Cyber Resilience Act to secure connected products 2024-10-11 at 14:17 By Zeljka Zorz The EU Council has adopted the Cyber Resilience Act (CRA), a new law that aims to make consumer products with digital components safe(r) to use. CRA requirements The CRA outlines EU-wide cybersecurity standards for digital products, i.e. products that are

React to this headline:

Loading spinner

EU adopts Cyber Resilience Act to secure connected products Read More »

Ubuntu 24.10 Oracular Oriole brings tighter security controls

Ubuntu 24.10 Oracular Oriole brings tighter security controls 2024-10-11 at 10:16 By Help Net Security Canonical released Ubuntu 24.10 Oracular Oriole, which brings notable advancements, including an updated kernel, new toolchains, and the GNOME 47 desktop environment, along with significant enhancements in software security. “Oracular Oriole sets a new pace for delivering the latest upstream

React to this headline:

Loading spinner

Ubuntu 24.10 Oracular Oriole brings tighter security controls Read More »

Data loss incidents impact patient care

Data loss incidents impact patient care 2024-10-11 at 08:31 By Help Net Security 92% of healthcare organizations experienced at least one cyber attack in the past 12 months, an increase from 88% in 2023, with 69% reporting disruption to patient care as a result, according to Proofpoint. Healthcare organizations struggle to mitigate risks from cyberattacks

React to this headline:

Loading spinner

Data loss incidents impact patient care Read More »

Unlocking the power of cryptographic agility in a quantum world

Unlocking the power of cryptographic agility in a quantum world 2024-10-11 at 07:31 By Mirko Zorz In this Help Net Security interview, Glen Leonhard, Director of Key Management at Cryptomathic, discusses the role of cryptographic agility in mitigating risks posed by quantum computing. Cryptographic agility enables organizations to seamlessly transition to post-quantum algorithms without disrupting

React to this headline:

Loading spinner

Unlocking the power of cryptographic agility in a quantum world Read More »

Scammers target Airbnb and Booking.com users

Scammers target Airbnb and Booking.com users 2024-10-11 at 07:01 By Help Net Security ESET researchers discovered that the organized scammer network Telekopye has expanded its operations to target users of popular accommodation booking platforms like Booking.com and Airbnb. They have also increased the sophistication of their victim selection and of targeting the two booking sites,

React to this headline:

Loading spinner

Scammers target Airbnb and Booking.com users Read More »

New infosec products of the week: October 11, 2024

New infosec products of the week: October 11, 2024 2024-10-11 at 06:31 By Help Net Security Here’s a look at the most interesting products from the past week, featuring releases from Action1, BreachLock, Commvault, Dashlane, Data Theorem, Edgio, Frontegg, and Qualys. Qualys Enterprise TruRisk Management unifies asset inventory and risk factors Qualys launched the Risk

React to this headline:

Loading spinner

New infosec products of the week: October 11, 2024 Read More »

How to setup passkeys in Apple Passwords app

How to setup passkeys in Apple Passwords app 2024-10-11 at 06:01 By Anamarija Pogorelec Beginning with iOS 18, iPadOS 18, macOS Sequoia, and visionOS 2, the Passwords app allows you to manage your passwords, passkeys, and verification codes. Passwords app interface Creating passkeys Passkeys are a password alternative designed to offer a more convenient and

React to this headline:

Loading spinner

How to setup passkeys in Apple Passwords app Read More »

Scroll to Top