Category: HelpnetSecurity

eBook: Keep assets secure after cloud migration
11
Sep
2024

eBook: Keep assets secure after cloud migration

Organizations sometimes need to plan their cloud migrations with more emphasis on security and compliance. Many, therefore, struggle to keep…

LOKKER's consent management solution blocks all unauthorized data collection on websites
11
Sep
2024

LOKKER’s consent management solution blocks all unauthorized data collection on websites

LOKKER released a new consent management solution available in its Privacy Edge Platform. This builds on LOKKER’s earlier release of…

Microsoft fixes 4 exploited zero-days and a code defect that nixed earlier security fixes
11
Sep
2024

Microsoft fixes 4 exploited zero-days and a code defect that nixed earlier security fixes

September 2024 Patch Tuesday is here and Microsoft has delivered 79 fixes, including those for a handful of zero-days (CVE-2024-38217,…

Ketch helps media brands enable privacy-safe data activation
10
Sep
2024

Ketch helps media brands enable privacy-safe data activation

Ketch launched its product suite for digital media brands. The digital media industry faces increasing challenges. Intense FTC scrutiny on…

CISA confirms that SonicWall vulnerability is getting exploited (CVE-2024-40766)
10
Sep
2024

CISA confirms that SonicWall vulnerability is getting exploited (CVE-2024-40766)

The US Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2024-40766 – a recently fixed improper access control vulnerability affecting…

33 open-source cybersecurity solutions you didn’t know you needed
10
Sep
2024

33 open-source cybersecurity solutions you didn’t know you needed

Open-source cybersecurity tools provide transparency and flexibility, allowing users to examine and customize the source code to fit specific security…

How human-led threat hunting complements automation in detecting cyber threats
10
Sep
2024

How human-led threat hunting complements automation in detecting cyber threats

In this Help Net Security interview, Shane Cox, Director, Cyber Fusion Center at MorganFranklin Consulting, discusses the evolving methodologies and…

Zyxel fixes critical command injection flaw in EOL NAS devices (CVE-2024-6342)
10
Sep
2024

Zyxel fixes critical command injection flaw in EOL NAS devices (CVE-2024-6342)

Users of Zyxel network-attached storage (NAS) devices are urged to implement hotfixes addressing a critical and easily exploited command injection…

Free SaaS Pulse tool from Wing Security enhances SaaS security posture
10
Sep
2024

Free SaaS Pulse tool from Wing Security enhances SaaS security posture

Wing Security has released SaaS Pulse, a free tool for SaaS security management, offering organizations actionable insights and continuous oversight…

Huntress launches Managed SIEM, eliminating the complexity of traditional SIEMs
10
Sep
2024

Huntress launches Managed SIEM, eliminating the complexity of traditional SIEMs

Huntress announces the arrival of its new Managed SIEM solution, designed to serve small—to mid-sized enterprises and their MSP allies…

Tech stack uniformity has become a systemic vulnerability
10
Sep
2024

Tech stack uniformity has become a systemic vulnerability

Crashes due to faulty updates are nothing new; in fact, one reason IT teams often delay updates is their unreliability…

Veeam Backup & Replication RCE flaw may soon be leveraged by ransomware gangs (CVE-2024-40711)
09
Sep
2024

Veeam Backup & Replication RCE flaw may soon be leveraged by ransomware gangs (CVE-2024-40711)

CVE-2024-40711, a critical vulnerability affecting Veeam Backup & Replication (VBR), could soon be exploited by attackers to steal enterprise data….