Category: HelpnetSecurity

The CIS Benchmarks Community consensus process
17
May
2023

The CIS Benchmarks Community consensus process

The Center for Internet Security (CIS) recently celebrated 20 years of bringing confidence to the connected world with consensus-based security…

Infamous cybercrime marketplace offers pre-order service for stolen credentials
17
May
2023

Infamous cybercrime marketplace offers pre-order service for stolen credentials

Infostealer malware, which consist of code that infects devices without the user’s knowledge and steals data, remains widely available to…

Aqua Security launches Real-Time CSPM to help teams focus on critical threats
16
May
2023

Aqua Security launches Real-Time CSPM to help teams focus on critical threats

Aqua Security has launched Real-Time CSPM, a next-gen cloud security posture management (CSPM) solution, which provides a complete view of…

Nozomi delivers Vantage IQ to strengthen cybersecurity and resilience for critical infrastructure
16
May
2023

Nozomi delivers Vantage IQ to strengthen cybersecurity and resilience for critical infrastructure

Nozomi Networks has introduced Vantage IQ, the AI-based analysis and response engine designed to address security gaps and resource limitations…

ComplyAdvantage Fraud Detection identifies and prevents transaction fraud
16
May
2023

ComplyAdvantage Fraud Detection identifies and prevents transaction fraud

Criminals have never had more avenues through which to defraud people. This has been fueled by the proliferation of technology…

Attack automation becomes a prevalent threat against APIs
16
May
2023

Attack automation becomes a prevalent threat against APIs

The second half of 2022 marked a significant turning point in the security landscape. In several high-profile incidents, application programming…

Fraudsters send fake invoice, follow up with fake exec confirmation
16
May
2023

Fraudsters send fake invoice, follow up with fake exec confirmation

Fraudsters are trying out a new approach to convince companies to pay bogus invoices: instead of hijacking existing email threads,…

Lacroix manufacturing facilities shut down following cyberattack
16
May
2023

Lacroix manufacturing facilities shut down following cyberattack

French electronics manufacturer Lacroix closed three factories as a result of a cyberattack they “intercepted” over the weekend, the company…

WhatsApp allows users to lock sensitive chats
16
May
2023

WhatsApp allows users to lock sensitive chats

Meta has unveiled Chat Lock within WhatsApp, a feature that allows users to keep sensitive and intimate conversations safe from…

Google Cloud CISO on why the Google Cybersecurity Certificate matters
16
May
2023

Google Cloud CISO on why the Google Cybersecurity Certificate matters

As part of Google’s commitment to building a strong cybersecurity workforce, the Google Cybersecurity Certificate offers an affordable and accessible…

3 tips to accelerate zero trust adoption
16
May
2023

3 tips to accelerate zero trust adoption

Zero trust adoption is beginning to accelerate as networks get more complex. Gartner predicts that by 2026, 10% of large…

Advantech's industrial serial device servers open to attack
15
May
2023

Advantech’s industrial serial device servers open to attack

Three vulnerabilities in Advantech’s EKI series of serial device servers could be exploited to execute arbitrary commands on the OS…