Category: HelpnetSecurity

New infosec products of the week: May 10, 2024
10
May
2024

New infosec products of the week: May 10, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Abnormal Security, AuditBoard, Cranium, Datadog,…

Zscaler swats claims of a significant breach
09
May
2024

Zscaler swats claims of a significant breach

On Wednesday, a threat actor named “InteIBroker” put up for sale “access to one of the largest cyber security companies”…

AuditBoard enhances InfoSec Solutions to reduce compliance fatigue across the organization
09
May
2024

AuditBoard enhances InfoSec Solutions to reduce compliance fatigue across the organization

AuditBoard announced powerful enhancements for its InfoSec Solutions to help organizations meet their IT compliance, cyber risk, and vendor risk…

CISA starts CVE "vulnrichment" program
09
May
2024

CISA starts CVE “vulnrichment” program

The US Cybersecurity and Infrastructure Agency (CISA) has announced the creation of “Vulnrichment,” a new project that aims to fill…

Regulators are coming for IoT device security
09
May
2024

Regulators are coming for IoT device security

Cybersecurity is a relatively new challenge for many IoT device makers who have traditionally produced non-connected devices. These devices were…

Global ransomware crisis worsens - Help Net Security
09
May
2024

Global ransomware crisis worsens – Help Net Security

Ransomware and extortion incidents surged by 67% in 2023, according to NTT Security Holdings’ 2024 Global Threat Intelligence Report. Global…

Ransomware attacks impact 20% of sensitive data in healthcare orgs
09
May
2024

Ransomware attacks impact 20% of sensitive data in healthcare orgs

Recent cyber incidents demonstrate the healthcare industry continues to be a prime target for ransomware hackers, according to Rubrik. New…

3 CIS resources to help you drive your cloud cybersecurity
09
May
2024

3 CIS resources to help you drive your cloud cybersecurity

In the process of moving to the cloud, you need a security-first cloud migration strategy that considers both your security…

Cado Security launches solution for forensic investigations in distroless container environments
08
May
2024

Cado Security launches solution for forensic investigations in distroless container environments

Cado Security has introduced a solution for conducting forensic investigations in distroless container environments. With Cado Security’s new offering, security…

SentinelOne Singularity Cloud Native Security simulates harmless attacks on cloud infrastructure
08
May
2024

SentinelOne Singularity Cloud Native Security simulates harmless attacks on cloud infrastructure

Attackers are targeting the scope and scale of the cloud to run rapid and coordinated threat campaigns. A new approach…

Attackers may be using TunnelVision to snoop on users' VPN traffic (CVE-2024-3661)
08
May
2024

Attackers may be using TunnelVision to snoop on users’ VPN traffic (CVE-2024-3661)

Researchers have brought to light a new attack method – dubbed TunnelVision and uniquely identified as CVE-2024-3661 – that can…

MITRE breach details reveal attackers' successes and failures
08
May
2024

MITRE breach details reveal attackers’ successes and failures

MITRE has shared a timeline of the recent breach if fell victim to and has confirmed that it began earlier…