Category: HelpnetSecurity

Phishers are increasingly impersonating electronic toll collection companies
03
Apr
2025

Phishers are increasingly impersonating electronic toll collection companies

Steam was the most imitated brands by phishers in the first quarter of 2025, followed by Microsoft and Facebook/Meta, Guardio…

CyberQP launches Zero Trust Helpdesk Security Platform
03
Apr
2025

CyberQP launches Zero Trust Helpdesk Security Platform

CyberQP has launched its Zero Trust Helpdesk Security Platform—combining QGuard for Privileged Access Management (PAM) and QDesk for End-User Access…

1touch.io helps organizations safeguard sensitive data
03
Apr
2025

1touch.io helps organizations safeguard sensitive data

1touch.io launched the next-generation Enterprise Data Security Posture Management (DSPM) platform, a solution designed specifically for hybrid, multi-cloud, on-premises, and…

Bluefin simplifies network tokenization access and management for merchants
03
Apr
2025

Bluefin simplifies network tokenization access and management for merchants

Bluefin announced the addition of network tokenization capabilities to its ShieldConex Tokenization as a Service and Orchestration platforms, enabling merchants…

Beware fake AutoCAD, SketchUp sites dropping malware
03
Apr
2025

Beware fake AutoCAD, SketchUp sites dropping malware

Malware peddlers are saddling users with the TookPS downloader and the Lapmon and TeviRat backdoors via malicious sites that mimic…

Cybercriminals exfiltrate data in just three days
03
Apr
2025

Cybercriminals exfiltrate data in just three days

In 56% of Sophos managed detection and response (MDR) and incident response (IR) cases, attackers gained initial access to networks…

Building a cybersecurity strategy that survives disruption
03
Apr
2025

Building a cybersecurity strategy that survives disruption

Cybersecurity isn’t what it used to be. Attackers are moving quicker, disruptions happen all the time, and many security plans…

Open-source malware doubles, data exfiltration attacks dominate
03
Apr
2025

Open-source malware doubles, data exfiltration attacks dominate

There’s been a notable shift in the types of threats targeting software developers, with a total of 17,954 open source…

Review: Zero to Engineer - Help Net Security
03
Apr
2025

Review: Zero to Engineer – Help Net Security

Zero to Engineer is a practical guide for anyone looking to launch a career in information technology without a traditional…

How to map and manage your cyber attack surface with EASM
02
Apr
2025

How to map and manage your cyber attack surface with EASM

In today’s digital landscape, understanding your organization’s attack surface is crucial for maintaining robust cybersecurity. To effectively manage and mitigate…

Utimaco releases Quantum Protect solution
02
Apr
2025

Utimaco releases Quantum Protect solution

Utimaco launched Quantum Protect, the Post Quantum Cryptography application package for its u.trust General Purpose HSM (Hardware Security Modules) Se-Series….

Google is making sending end-to-end encrypted emails easy
02
Apr
2025

Google is making sending end-to-end encrypted emails easy

Sending end-to-end encrypted (E2EE) emails from Gmail enterprise accounts is about to become much easier than it is now, Google…