Category: HelpnetSecurity

Infostealers and the high value of stolen data
13
Nov
2023

Infostealers and the high value of stolen data

The risk of personal and professional data being stolen by nefarious actors looms larger than ever, according to Trend Micro….

Kubernetes adoption creates new cybersecurity challenges
13
Nov
2023

Kubernetes adoption creates new cybersecurity challenges

To maintain a competitive edge, modern organizations are evolving toward highly scalable, flexible and resilient applications – leading to the…

Week in review: Sumo Logic breach, 7 free cyber threat maps, Patch Tuesday forecast
12
Nov
2023

Week in review: Sumo Logic breach, 7 free cyber threat maps, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Exploring the global shift towards…

How to withstand the onslaught of cybersecurity threats
10
Nov
2023

How to withstand the onslaught of cybersecurity threats

“We brought a shovel to fight an avalanche.” That’s the sentiment shared by many business leaders, especially CISOs, CIOs and…

November 2023 Patch Tuesday forecast: Year 21 begins
10
Nov
2023

November 2023 Patch Tuesday forecast: Year 21 begins

The October forecast for large numbers of CVEs addressed in Windows 10 and 11 and the recent record on the…

New infosec products of the week: November 10, 2023
10
Nov
2023

New infosec products of the week: November 10, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Aqua Security, ARMO, Druva, IRONSCALES,…

Data protection demands AI-specific security strategies
10
Nov
2023

Data protection demands AI-specific security strategies

Adoption and use of AI tools is high across organizations, however many are concerned about the impacts AI will have…

Organizations lack the skills and headcount to manage Kubernetes
10
Nov
2023

Organizations lack the skills and headcount to manage Kubernetes

The Kubernetes industry is undergoing rapid change and evolution due to the growth of edge computing, the acceleration of AI,…

Sandworm hackers incapacitated Ukrainian power grid amid missile strike
09
Nov
2023

Sandworm hackers incapacitated Ukrainian power grid amid missile strike

Russia-backed ATP group Sandworm is behind the cyberattack that caused disruption of parts of the Ukrainian power grid in late…

MOVEit hackers leverage new zero-day bug to breach organizations (CVE-2023-47246)
09
Nov
2023

MOVEit hackers leverage new zero-day bug to breach organizations (CVE-2023-47246)

A critical zero-day vulnerability (CVE-2023-47246) in the SysAid IT support and management software solution is being exploited by Lace Tempest,…

Open-source vulnerability disclosure: Exploitable weak spots
09
Nov
2023

Open-source vulnerability disclosure: Exploitable weak spots

Flaws in the vulnerability disclosure process of open-source projects could be exploited by attackers to harvest the information needed to…

Security in the impending age of quantum computers
09
Nov
2023

Security in the impending age of quantum computers

Quantum computing is poised to be one of the most important technologies of the 21st century. With global governments having…