Category: HelpnetSecurity

eBook: CISSP fundamentals in focus
06
May
2024

eBook: CISSP fundamentals in focus

From the technical tools that help manage access control to non-technical skills like collaboration, learn about the fundamentals required in…

Week in review: PoCs allow persistence on Palo Alto firewalls, Okta credential stuffing attacks
05
May
2024

Week in review: PoCs allow persistence on Palo Alto firewalls, Okta credential stuffing attacks

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Palo Alto firewalls: CVE-2024-3400 exploitation…

Bug hunters can get up to $450,000 for an RCE in Google's Android apps
03
May
2024

Bug hunters can get up to $450,000 for an RCE in Google’s Android apps

Google has drastically increased the rewards bug hunters can get for reporting vulnerabilities in Android apps it develops and maintains….

Microsoft, Google widen passkey support for its users
03
May
2024

Microsoft, Google widen passkey support for its users

Since 2013, the first Thursday in May is marked as World Password Day, a day dedicated to raising awareness about…

Trellix Wise automates security workflows with AI, streamlining threat detection and remediation
03
May
2024

Trellix Wise automates security workflows with AI, streamlining threat detection and remediation

Trellix has unveiled Trellix Wise, a powerful suite of traditional and Generative Artificial Intelligence (GenAI) tools to drastically reduce cyber…

New infosec products of the week: May 3, 2024
03
May
2024

New infosec products of the week: May 3, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Appdome, Cybersixgill, Proofpoint, Secure Code…

Ransom recovery costs reach $2.73 million
03
May
2024

Ransom recovery costs reach $2.73 million

Average ransom payment has increased 500% in the last year, according to Sophos. Organizations that paid the ransom reported an…

Most companies changed their cybersecurity strategy in the past year
03
May
2024

Most companies changed their cybersecurity strategy in the past year

Businesses worldwide have faced a rate of change in the threat environment evidenced by 95% of companies reporting cybersecurity strategy…

What is cybersecurity mesh architecture (CSMA)?
03
May
2024

What is cybersecurity mesh architecture (CSMA)?

Cybersecurity mesh architecture (CSMA) is a set of organizing principles used to create an effective security framework. Using a CSMA…

97% of security leaders have increased SaaS security budgets
03
May
2024

97% of security leaders have increased SaaS security budgets

58% of the organizations were affected by a SaaS security incident in the last 18 months, according to Valence Security’s…

Proofpoint DLP Transform secures data moving to ChatGPT, copilots, and other GenAI tools
02
May
2024

Proofpoint DLP Transform secures data moving to ChatGPT, copilots, and other GenAI tools

Proofpoint announced Data Loss Prevention (DLP) Transform, including GenAI use cases. Today, businesses struggle with the limitations of legacy DLP…

New SOHO router malware aims for cloud accounts, internal company resources
02
May
2024

New SOHO router malware aims for cloud accounts, internal company resources

Cuttlefish, a new malware family that targets enterprise-grade small office/home office (SOHO) routers, is used by criminals to steal account…