Category: HelpnetSecurity

Unlocking the value of AI-powered identity security
16
Oct
2024

Unlocking the value of AI-powered identity security

While most organizations are still in the early horizons of their identity security journey, those who achieve maturity are seeing…

Nametag Deepfake Defense blocks AI-powered impersonation threats
15
Oct
2024

Nametag Deepfake Defense blocks AI-powered impersonation threats

More than 50% of executives expect deepfake attacks to increase over the next 12 months, but only 7% report using…

Attackers deploying red teaming tool for EDR evasion
15
Oct
2024

Attackers deploying red teaming tool for EDR evasion

Threat actors are leveraging the open-source EDRSilencer tool to evade endpoint detection and response systems, Trend Micro researchers have noticed….

Cato DEM helps IT teams overcome network performance problems
15
Oct
2024

Cato DEM helps IT teams overcome network performance problems

Cato Networks expanded the Cato SASE Cloud Platform by introducing Cato Digital Experience Monitoring (DEM). This announcement is the third…

Sectigo SiteLock 2.0 simplifies website protection for SMBs
15
Oct
2024

Sectigo SiteLock 2.0 simplifies website protection for SMBs

Sectigo announced SiteLock 2.0, a major upgrade to SiteLock, its website security and protection platform. SiteLock 2.0 is designed to…

87,000+ Fortinet devices still open to attack, are yours among them? (CVE-2024-23113)
15
Oct
2024

87,000+ Fortinet devices still open to attack, are yours among them? (CVE-2024-23113)

Last week, CISA added CVE-2024-23113 – a critical vulnerability that allows unauthenticated remote code/command execution on unpatched Fortinet FortiGate firewalls…

The NHI management challenge: When employees leave
15
Oct
2024

The NHI management challenge: When employees leave

An employee is exiting your organization. Regardless of the terms of departure, an ex-staffer has the potential when they leave…

How nation-states exploit political instability to launch cyber operations
15
Oct
2024

How nation-states exploit political instability to launch cyber operations

In this Help Net Security interview, Ismael Valenzuela, Vice President of Threat Research & Intelligence at BlackBerry, discusses the impact…

Data breaches trigger increase in cyber insurance claims
15
Oct
2024

Data breaches trigger increase in cyber insurance claims

Cyber claims have continued their upwards trend over the past year, driven in large part by a rise in data…

How to create verification codes in Apple Passwords app
15
Oct
2024

How to create verification codes in Apple Passwords app

Starting with iOS 18, iPadOS 18, macOS Sequoia, and visionOS 2, the Apple Passwords app enables you to manage your…

GitGuardian Visual Studio Code extension helps developers protect their sensitive information
14
Oct
2024

GitGuardian Visual Studio Code extension helps developers protect their sensitive information

Stolen credentials remain the most common cause of a data breach. Various methods exist to prevent such breaches, and the…

Breaking down the numbers: Q3 2024 cybersecurity funding activity recap
14
Oct
2024

Breaking down the numbers: Q3 2024 cybersecurity funding activity recap

We present a list of selected cybersecurity companies that received funding during the third quarter of 2024 (Q3 2024). Apono…