Category: HelpnetSecurity

10 must-read cybersecurity books for 2024
06
Feb
2024

10 must-read cybersecurity books for 2024

Our list of cybersecurity books has been curated to steer your professional growth in 2024. This selection aims to provide…

Paying ransoms is becoming a cost of doing business for many
06
Feb
2024

Paying ransoms is becoming a cost of doing business for many

Today’s pervasive cyberattacks are forcing the majority of companies to pay ransoms and break their ‘do not pay’ policies, with…

Metomic for ChatGPT identifies critical risks in ChatGPT conversations
05
Feb
2024

Metomic for ChatGPT identifies critical risks in ChatGPT conversations

Metomic launched Metomic for ChatGPT, a technology that gives IT and security leaders full visibility into what sensitive data is…

Varonis MDDR helps organizations prevent data breaches
05
Feb
2024

Varonis MDDR helps organizations prevent data breaches

Varonis introduced Varonis Managed Data Detection and Response (MDDR), a managed service dedicated to stopping threats at the data level….

Deepfaked video conference call makes employee send $25 million to scammers
05
Feb
2024

Deepfaked video conference call makes employee send $25 million to scammers

A deepfake video conference call paired with social engineering tricks has led to the theft of over US$25 million from…

OPSWAT enhances its MetaDefender Kiosk product line
05
Feb
2024

OPSWAT enhances its MetaDefender Kiosk product line

OPSWAT announced new advancements to its MetaDefender Kiosk product line. In response to the escalating challenges faced by organizations in…

AnyDesk has been hacked, users urged to change passwords
05
Feb
2024

AnyDesk has been hacked, users urged to change passwords

AnyDesk Software GmbH, the German company behind the widely used (and misused) remote desktop application of the same name, has…

Migrating to the cloud: An overview of process and strategy
05
Feb
2024

Migrating to the cloud: An overview of process and strategy

Over the next few years, the number of organizations navigating to the cloud to advance their business goals is expected…

Researchers discover exposed API secrets, impacting major tech tokens
05
Feb
2024

Researchers discover exposed API secrets, impacting major tech tokens

Escape’s security research team scanned 189.5 million URLs and found more than 18,000 exposed API secrets. 41% of exposed secrets…

Latio Application Security Tester: Use AI to scan your code
05
Feb
2024

Latio Application Security Tester: Use AI to scan your code

Latio Application Security Tester is an open-source tool that enables the usage of OpenAI to scan code from the CLI…

Businesses banning or limiting use of GenAI over privacy risks
05
Feb
2024

Businesses banning or limiting use of GenAI over privacy risks

Privacy is much more than a regulatory compliance matter. Findings from a new Cisco study highlight the growing Privacy concerns…

Week in review: Windows Event Log zero-day, exploited critical Jenkins RCE flaw
04
Feb
2024

Week in review: Windows Event Log zero-day, exploited critical Jenkins RCE flaw

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Prioritizing cybercrime intelligence for effective…