Category: HelpnetSecurity

Only 13% of medical devices support endpoint protection agents
14
Mar
2024

Only 13% of medical devices support endpoint protection agents

63% of CISA-tracked Known Exploited Vulnerabilities (KEVs) can be found on healthcare networks, while 23% of medical devices—including imaging devices,…

IT leaders think immutable data storage is an insurance policy against ransomware
14
Mar
2024

IT leaders think immutable data storage is an insurance policy against ransomware

IT leaders consider immutable storage as a must-have in the fight against cyberattacks, according to Scality. Ransomware threats are now…

Tenable enhances ExposureAI capabilities to directly query AI engine and reduce risk
13
Mar
2024

Tenable enhances ExposureAI capabilities to directly query AI engine and reduce risk

Tenable has unveiled enhancements to ExposureAI, the generative AI capabilities and services within its Tenable One Exposure Management Platform. The…

The effects of law enforcement takedowns on the ransomware landscape
13
Mar
2024

The effects of law enforcement takedowns on the ransomware landscape

While the results of law enforcement action against ransomware-as-a-service operators Alphv/BlackCat and LockBit are yet to be fully realized, the…

DataDome Ad Protect detects fraudulent ad traffic
13
Mar
2024

DataDome Ad Protect detects fraudulent ad traffic

DataDome launched DataDome Ad Protect, designed to combat fraudulent traffic affecting digital ad campaigns. This solution is set to transform…

Regula 4205D updates help border control authorities fight identity document fraud
13
Mar
2024

Regula 4205D updates help border control authorities fight identity document fraud

The International Organization for Migration reports that the migrant flow has been steadily rising, with the numbers swelling from 153…

LastPass' CIO vision for driving business strategy, innovation
13
Mar
2024

LastPass’ CIO vision for driving business strategy, innovation

Recently, LastPass appointed Asad Siddiqui as its CIO. He brings over two decades of experience leading startups and large technology…

BSAM: Open-source methodology for Bluetooth security assessment
13
Mar
2024

BSAM: Open-source methodology for Bluetooth security assessment

Many wireless headsets using Bluetooth technology have vulnerabilities that may allow malicious individuals to covertly listen in on private conversations,…

Keyloggers, spyware, and stealers dominate SMB malware detections
13
Mar
2024

Keyloggers, spyware, and stealers dominate SMB malware detections

In 2023, 50% of malware detections for SMBs were keyloggers, spyware and stealers, malware that attackers use to steal data…

Product showcase: How to track SaaS security best practices with Nudge Security
13
Mar
2024

Product showcase: How to track SaaS security best practices with Nudge Security

As technology adoption has shifted to be employee-led, IT and security teams are contending with an ever-expanding SaaS attack surface….

March 2024 Patch Tuesday: Microsoft fixes critical bugs in Windows Hyper-V
12
Mar
2024

March 2024 Patch Tuesday: Microsoft fixes critical bugs in Windows Hyper-V

On this March 2024 Patch Tuesday, Microsoft has released fixes for 59 CVE-numbered vulnerabilities, but – welcome news! – none…

Hackers leverage 1-day vulnerabilities to deliver custom Linux malware
12
Mar
2024

Hackers leverage 1-day vulnerabilities to deliver custom Linux malware

A financially motivated threat actor is using known vulnerabilities to target public-facing services and deliver custom malware to unpatched Windows…