Category: HelpnetSecurity

Aranya: Open-source toolkit to accelerate secure by design concepts
21
Oct
2024

Aranya: Open-source toolkit to accelerate secure by design concepts

SpiderOak launched its core technology platform as an open-source project called Aranya. This release provides the same level of security…

Should the CISOs role be split into two functions?
21
Oct
2024

Should the CISOs role be split into two functions?

84% of CISOs believe the role needs to be split into two functions – one technical and one business-focused, to…

Week in review: 87k+ Fortinet devices still open to attack, red teaming tool used for EDR evasion
20
Oct
2024

Week in review: 87k+ Fortinet devices still open to attack, red teaming tool used for EDR evasion

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 87,000+ Fortinet devices still open…

Israeli orgs targeted with wiper malware via ESET-branded emails
18
Oct
2024

Israeli orgs targeted with wiper malware via ESET-branded emails

Attackers have tried to deliver wiper malware to employees at organizations across Israel by impersonating cybersecurity company ESET via email….

Arrested: USDoD, Anonymous Sudan, SEC X account hacker
18
Oct
2024

Arrested: USDoD, Anonymous Sudan, SEC X account hacker

Law enforcement agencies have arrested suspects involved in cyber attacks claimed by USDoD and Anonymous Sudan, as well as a…

New infosec products of the week: October 18, 2024
18
Oct
2024

New infosec products of the week: October 18, 2024

Here’s a look at the most interesting products from the past week, featuring releases from ExtraHop, GitGuardian, Nametag, Okta, Rubrik,…

Despite massive security spending, 44% of CISOs fail to detect breaches
18
Oct
2024

Despite massive security spending, 44% of CISOs fail to detect breaches

Despite global information security spending projected to reach $215 billion in 2024, 44% of CISOs surveyed reported they were unable…

What to do if your iPhone or Android smartphone gets stolen?
18
Oct
2024

What to do if your iPhone or Android smartphone gets stolen?

A lost, stolen, or compromised smartphone today means we are in serious trouble. Most people have everything related to their…

Cybercrime's constant rise is becoming everyone's problem
18
Oct
2024

Cybercrime’s constant rise is becoming everyone’s problem

Cybercrime in recent years shows no signs of slowing down, with phishing attacks surging and ransomware tactics becoming more advanced,…

Fake Google Meet pages deliver infostealers
17
Oct
2024

Fake Google Meet pages deliver infostealers

Users of the Google Meet video communication service have been targeted by cyber crooks using the ClickFix tactic to infect…

The role of compromised cyber-physical devices in modern cyberattacks
17
Oct
2024

The role of compromised cyber-physical devices in modern cyberattacks

Cyber-physical devices are increasingly getting compromised and leveraged by criminal groups and state-sponsored threat actors. Fyodor Yarochkin, Senior Threat Solution…

MongoDB Queryable Encryption now supports range queries on encrypted data
17
Oct
2024

MongoDB Queryable Encryption now supports range queries on encrypted data

MongoDB Queryable Encryption allows customers to securely encrypt sensitive application data and store it in an encrypted format within the…