Category: HelpnetSecurity

MOVEit Transfer zero-day attacks: The latest info
02
Jun
2023

MOVEit Transfer zero-day attacks: The latest info

There’s new information about the zero-day vulnerability in Progress Software’s MOVEit Transfer solution exploited by attackers and – more importantly…

New infosec products of the week: June 2, 2023
02
Jun
2023

New infosec products of the week: June 2, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Bitdefender, ConnectSecure, CYTRACOM, Permit.io, and…

How defense contractors can move from cybersecurity to cyber resilience
02
Jun
2023

How defense contractors can move from cybersecurity to cyber resilience

As the world’s most powerful military and economic power, the United States also holds another, less impressive distinction: Cyber threat…

Despite cutbacks, IT salaries expected to rise
02
Jun
2023

Despite cutbacks, IT salaries expected to rise

Despite rising labor costs, economic inflation, and companies making an effort to cut back, the salary outlook for IT professionals…

Cybercriminals use legitimate websites to obfuscate malicious payloads
02
Jun
2023

Cybercriminals use legitimate websites to obfuscate malicious payloads

According to Egress, the evolving attack methodologies currently used by cybercriminals are designed to get through traditional perimeter security. “The…

Critical zero-day vulnerability in MOVEit Transfer exploited by attackers!
01
Jun
2023

Critical zero-day vulnerability in MOVEit Transfer exploited by attackers!

A critical zero-day vulnerability in Progress Software’s enterprise managed file transfer solution MOVEit Transfer is being exploited by attackers to…

CYTRACOM improves efficiency for MSPs with ControlOne platform updates
01
Jun
2023

CYTRACOM improves efficiency for MSPs with ControlOne platform updates

CYTRACOM announces a significant update to its ControlOne platform, enabling MSPs to prevent managed clients from evading security requirements and…

Threat actors can exfiltrate data from Google Drive without leaving a trace
01
Jun
2023

Threat actors can exfiltrate data from Google Drive without leaving a trace

Google Workspace (formerly G Suite) has a weak spot that can prevent the discovery of data exfiltration from Google Drive…

Why organizations should adopt a cloud cybersecurity framework
01
Jun
2023

Why organizations should adopt a cloud cybersecurity framework

The cloud is the future of enterprise architecture. It’s economical (to a degree), it’s scalable, it’s flexible and – best…

Navigating cybersecurity in the age of remote work
01
Jun
2023

Navigating cybersecurity in the age of remote work

In this Help Net Security interview, Jay Chaudhry, CEO at Zscaler, talks about connecting and securing remote employees and their…

Phishing campaigns thrive as evasive tactics outsmart conventional detection
01
Jun
2023

Phishing campaigns thrive as evasive tactics outsmart conventional detection

A 25% increase in the use of phishing kits has been recorded in 2022, according to Group-IB. The key phishing…

Infosec products of the month: May 2023
01
Jun
2023

Infosec products of the month: May 2023

Here’s a look at the most interesting products from the past month, featuring releases from: Aqua Security, Axiado, Bitwarden, Cloudflare,…