Category: HelpnetSecurity

19
Jun
2024

Rising exploitation in enterprise software: Key trends for CISOs

Action1 researchers found an alarming increase in the total number of vulnerabilities across all enterprise software categories. “With the NVD’s…

18
Jun
2024

Atsign NoPorts establishes an encrypted IP tunnel directly between devices

Atsign introduces NoPorts to offer a secure remote access solution, exceeding current limitations and setting a new standard for secure…

18
Jun
2024

Medibank breach: Security failures revealed (lack of MFA among them)

The 2022 Medibank data breach / extortion attack perpetrated by the REvil ransomware group started by the attackers leveraging login…

18
Jun
2024

NinjaOne MDM provides visibility and control over mobile devices

NinjaOne has expanded its platform with mobile device management (MDM). The new solution increases employee productivity and reduces complexity, risk,…

18
Jun
2024

Veritas Data Insight classifies and controls unstructured data

Veritas Technologies announced better choice and flexibility for customers requiring data compliance solutions. Veritas Data Insight, which allows organizations to…

18
Jun
2024

Critical RCE flaws in vCenter Server fixed (CVE-2024-37079, CVE-2024-37080)

VMware by Broadcom has fixed two critical vulnerabilities (CVE-2024-37079, CVE-2024-37080) affecting VMware vCenter Server and products that contain it: vSphere…

18
Jun
2024

eBook: The Art & Science of Secure Software Development

Software security requires a creative and disciplined approach. It involves having the vision to develop secure strategy, tactics, and execution….

18
Jun
2024

Datadog App Builder helps accelerate issue remediation

Datadog launched Datadog App Builder, a low-code development tool that helps teams create self-service applications and integrate them securely into…

18
Jun
2024

How to create your cybersecurity “Google Maps”: A step-by-step guide for security teams

Cybersecurity isn’t just about firewalls and antivirus. It’s about understanding how your defenses, people, and processes work together. Just like…

18
Jun
2024

Enhancing security through collaboration with the open-source community

In this Help Net Security interview, Alan DeKok, CEO at NetworkRADIUS, discusses the need for due diligence in selecting and…

18
Jun
2024

Mass exploitation is the new primary attack vector for ransomware

The cyber threat landscape in 2023 and 2024 has been dominated by mass exploitation, according to WithSecure. Edge service KEV…

18
Jun
2024

42% plan to use API security for AI data protection

While 75% of enterprises are implementing AI, 72% report significant data quality issues and an inability to scale data practices,…