Category: HelpnetSecurity

Data Theorem Code Secure helps security and DevOps teams secure their software
08
Oct
2024

Data Theorem Code Secure helps security and DevOps teams secure their software

Data Theorem launched Code Secure, the latest evolution in application security designed to protect the software supply chain from code…

Qualcomm zero-day under targeted exploitation (CVE-2024-43047)
08
Oct
2024

Qualcomm zero-day under targeted exploitation (CVE-2024-43047)

An actively exploited zero-day vulnerability (CVE-2024-43047) affecting dozens of Qualcomm’s chipsets has been patched by the American semiconductor giant. About…

American Water shuts down systems after cyberattack
08
Oct
2024

American Water shuts down systems after cyberattack

American Water, the largest water and wastewater utility company in the US, has shut down some of its systems following…

BreachLock Attack Surface Analytics strengthens enterprise CTEM capabilities
08
Oct
2024

BreachLock Attack Surface Analytics strengthens enterprise CTEM capabilities

BreachLock strengthens continuous threat exposure management (CTEM) capabilities for enterprise customers with its new Attack Surface Analytics feature. Time is…

The role of self-sovereign identity in enterprises
08
Oct
2024

The role of self-sovereign identity in enterprises

As personal data becomes increasingly commodified and centralized, the need for individuals to reclaim control over their identities has never…

How hybrid workforces are reshaping authentication strategies
08
Oct
2024

How hybrid workforces are reshaping authentication strategies

In this Help Net Security interview, Brian Pontarelli, CEO at FusionAuth, discusses the evolving authentication challenges posed by the rise…

Websites are losing the fight against bot attacks
08
Oct
2024

Websites are losing the fight against bot attacks

The discovery that 95% of advanced bot attacks go undetected points to a weakness in current detection and mitigation strategies….

Action1 offers extended endpoint management capabilities for macOS devices
07
Oct
2024

Action1 offers extended endpoint management capabilities for macOS devices

Action1 announced its latest product release. As part of its platform enhancements, Action1 has introduced a new agent for macOS,…

Linux systems targeted with stealthy “Perfctl” cryptomining malware
07
Oct
2024

Linux systems targeted with stealthy “Perfctl” cryptomining malware

Thousands of Linux systems are likely infected with the highly elusive and persistent “perfctl” (or “perfcc“) cryptomining malware and many…

SOC teams are frustrated with their security tools
07
Oct
2024

SOC teams are frustrated with their security tools

Security operations center (SOC) practitioners believe they are losing the battle detecting and prioritizing real threats – due to too…

The case for enterprise exposure management
07
Oct
2024

The case for enterprise exposure management

For several years, external attack surface management (EASM) has been an important focus for many security organizations and the vendors…

Transforming cloud security with real-time visibility
07
Oct
2024

Transforming cloud security with real-time visibility

In this Help Net Security interview, Amiram Shachar, CEO at Upwind, discusses the complexities of cloud security in hybrid and…