Category: HelpnetSecurity

Proofpoint DLP Transform secures data moving to ChatGPT, copilots, and other GenAI tools
02
May
2024

Proofpoint DLP Transform secures data moving to ChatGPT, copilots, and other GenAI tools

Proofpoint announced Data Loss Prevention (DLP) Transform, including GenAI use cases. Today, businesses struggle with the limitations of legacy DLP…

New SOHO router malware aims for cloud accounts, internal company resources
02
May
2024

New SOHO router malware aims for cloud accounts, internal company resources

Cuttlefish, a new malware family that targets enterprise-grade small office/home office (SOHO) routers, is used by criminals to steal account…

Secure Code Warrior SCW Trust Score quantifies the security posture of developer teams
02
May
2024

Secure Code Warrior SCW Trust Score quantifies the security posture of developer teams

Secure Code Warrior unveiled SCW Trust Score, a benchmark that quantifies the security posture of organizations’ developer teams. SCW Trust…

Appdome launches MobileEDR, merging MTD and EDR to protect enterprise mobile apps
02
May
2024

Appdome launches MobileEDR, merging MTD and EDR to protect enterprise mobile apps

Appdome has released Appdome MobileEDR, a new enterprise mobile app protection service that consolidates Mobile Threat Defense (MTD) and Endpoint…

Dropbox says attackers accessed customer and MFA info, API keys
02
May
2024

Dropbox says attackers accessed customer and MFA info, API keys

File hosting service Dropbox has confirmed that attackers have breached the Dropbox Sign production environment and accessed customer personal and…

AI-driven phishing attacks deceive even the most aware users
02
May
2024

AI-driven phishing attacks deceive even the most aware users

Vishing and deepfake phishing attacks are on the rise as attackers leverage GenAI to amplify social engineering tactics, according to…

Understanding emerging AI and data privacy regulations
02
May
2024

Understanding emerging AI and data privacy regulations

In this Help Net Security interview, Sophie Stalla-Bourdillon, Senior Privacy Counsel & Legal Engineer at Immuta, discusses the AI Act,…

2024 Data Breach Investigations Report: Most breaches involve a non-malicious human element
02
May
2024

2024 Data Breach Investigations Report: Most breaches involve a non-malicious human element

The exploitation of vulnerabilities as an initial point of entry almost tripled from the previous year, accounting for 14% of…

Securing your organization's supply chain: Reducing the risks of third parties
02
May
2024

Securing your organization’s supply chain: Reducing the risks of third parties

When Stephen Hawking said that “we are all now connected by the internet, like neurons in a giant brain”, very…

reNgine: Open-source automated reconnaissance framework for web applications
02
May
2024

reNgine: Open-source automated reconnaissance framework for web applications

reNgine is an open-source automated reconnaissance framework for web applications that focuses on a highly configurable and streamlined recon process….

Women rising in cybersecurity roles, but roadblocks remain
02
May
2024

Women rising in cybersecurity roles, but roadblocks remain

The ISC2 study on women in cybersecurity, a comprehensive research effort that collected responses from 2,400 women, has revealed several…

Making cybersecurity more appealing to women, closing the skills gap
01
May
2024

Making cybersecurity more appealing to women, closing the skills gap

In this Help Net Security interview, Charly Davis, CCO at Sapphire, provides insights into the current challenges and barriers women…