Category: HelpnetSecurity

Fake Google Meet pages deliver infostealers
17
Oct
2024

Fake Google Meet pages deliver infostealers

Users of the Google Meet video communication service have been targeted by cyber crooks using the ClickFix tactic to infect…

The role of compromised cyber-physical devices in modern cyberattacks
17
Oct
2024

The role of compromised cyber-physical devices in modern cyberattacks

Cyber-physical devices are increasingly getting compromised and leveraged by criminal groups and state-sponsored threat actors. Fyodor Yarochkin, Senior Threat Solution…

MongoDB Queryable Encryption now supports range queries on encrypted data
17
Oct
2024

MongoDB Queryable Encryption now supports range queries on encrypted data

MongoDB Queryable Encryption allows customers to securely encrypt sensitive application data and store it in an encrypted format within the…

GhostStrike: Open-source tool for ethical hacking
17
Oct
2024

GhostStrike: Open-source tool for ethical hacking

GhostStrike is an open-source, advanced cybersecurity tool tailored for ethical hacking and Red Team operations. It incorporates cutting-edge techniques, including…

How NIS2 will impact sectors from healthcare to energy
17
Oct
2024

How NIS2 will impact sectors from healthcare to energy

In this Help Net Security interview, Mick Baccio, Global Security Advisor at Splunk SURGe, discusses the far-reaching implications of the…

17
Oct
2024

Why companies are struggling to keep up with SaaS data protection

While businesses increasingly rely on SaaS tools, many leaders are not fully confident in their ability to safeguard their data,…

ExtraHop RevealX enhancements accelerate investigation workflows
16
Oct
2024

ExtraHop RevealX enhancements accelerate investigation workflows

ExtraHop unveiled new network-based file analysis capabilities in ExtraHop RevealX to detect malware, combat ransomware, and help prevent data loss….

Product showcase: Secure and scale your network with NordLayer's advanced security solutions
16
Oct
2024

Product showcase: Secure and scale your network with NordLayer’s advanced security solutions

Cybersecurity threats have become increasingly prevalent and sophisticated in recent years, posing significant risks to businesses of all sizes. In…

Defenders must adapt to shrinking exploitation timelines
16
Oct
2024

Defenders must adapt to shrinking exploitation timelines

A new report from Mandiant reveals that the average time-to-exploit vulnerabilities before or after a patch is released has plunged…

Android 15 unveils new security features to protect sensitive data
16
Oct
2024

Android 15 unveils new security features to protect sensitive data

Android 15 brings enhanced security features to protect your sensitive health, financial, and personal data from theft and fraud. It…

Rubrik DSPM for Microsoft 365 Copilot reduces the risk of sensitive data exposure
16
Oct
2024

Rubrik DSPM for Microsoft 365 Copilot reduces the risk of sensitive data exposure

As organizations and their volume of Microsoft 365 data grow, protecting sensitive data and managing access has become even more…

Strengthening Kubernetes security posture with these essential steps
16
Oct
2024

Strengthening Kubernetes security posture with these essential steps

In this Help Net Security interview, Paolo Mainardi, CTO at SparkFabrik, discusses comprehensive strategies to secure Kubernetes environments from development…