Author: Cybernoz

10 cybersecurity startups to watch in 2024
21
Feb
2024

10 cybersecurity startups to watch in 2024

At Help Net Security, we’ve been following the cybersecurity business landscape closely for the past 25 years. Through our Industry…

Disinformation and Credential-Harvesting Attacks
21
Feb
2024

Russian Hackers Target Ukraine with Disinformation and Credential-Harvesting Attacks

Feb 21, 2024NewsroomPhishing Attack / Information Warfare Cybersecurity researchers have unearthed a new influence operation targeting Ukraine that leverages spam…

Flying into cloud – EasyJet’s journey out of the datacentre to AI
21
Feb
2024

Flying into cloud – EasyJet’s journey out of the datacentre to AI

Thank you for joining! Access your Pro+ Content below. 20 February 2024 Flying into cloud – EasyJet’s journey out of…

SugarLocker member arrest
21
Feb
2024

SugarLocker Member Arrest: Russian Enforcement Takes Lead

Russian authorities have detained a hacker named Aleksandr Ermakov, believed to be behind the notorious SugarLocker ransomware attacks, which have…

VMware client plug-in has critical vulnerability
21
Feb
2024

VMware client plug-in has critical vulnerability – Security

A deprecated authentication plug-in for VSphere, the enhanced authentication plug-in (EAP), carries two vulnerabilities, one critical, and should be disabled…

Critical infrastructure software maker confirms ransomware attack   Bill   16:29
21
Feb
2024

Critical infrastructure software maker confirms ransomware attack

PSI Software SE, a German software developer for complex production and logistics processes, has confirmed that the cyber incident it disclosed…

Threat Intelligence as-a-Service: As good or better than D-I-Y?
21
Feb
2024

Threat Intelligence as-a-Service: As good or better than D-I-Y?

[By Avkash Kathiriya, Senior Vice President, Research and Innovation at Cyware] There was a time when managed security service providers…

TruffleHog: Open-source solution for scanning secrets
21
Feb
2024

TruffleHog: Open-source solution for scanning secrets

TruffleHog is an open-source scanner that identifies and addresses exposed secrets throughout your entire technology stack. “TruffleHog was originally a…

Government agrees law to protect confidential journalistic material from state hacking
21
Feb
2024

Government agrees law to protect confidential journalistic material from state hacking

The government has agreed to bring in legislation to require MI5 and GCHQ to seek independent authorisation before accessing confidential…

Privacy Watchdog to investigate HWL Ebsworth over security and notifications
21
Feb
2024

Privacy Watchdog to investigate HWL Ebsworth over security and notifications – Security

HWL Ebsworth is facing an official investigation by Australia’s privacy watchdog following a cyber security incident last year.  The investigation…

Data points
21
Feb
2024

Ransomware Groups, Targeting Preferences, and the Access Economy

How do ransomware groups pick their targets? It’s a rhetorical question: in the vast majority of cases they don’t. Ransomware-as-a-service…

API Security in 2024: Navigating New Threats and Trends
21
Feb
2024

API Security in 2024: Navigating New Threats and Trends

[By Tyler Shields, Vice President at Traceable AI] As we step into 2024, the landscape of API security is at…