Category: HelpnetSecurity

MSPs undergo transformation in response to persistent cyber threats
22
Feb
2024

MSPs undergo transformation in response to persistent cyber threats

2Organizations are increasingly turning to Managed Service Providers (MSPs) to alleviate pressure on IT departments, according to SonicWall. Managed services…

VMware pushes admins to uninstall vulnerable, deprecated vSphere plugin (CVE-2024-22245, CVE-2024-22250)
21
Feb
2024

VMware pushes admins to uninstall vulnerable, deprecated vSphere plugin (CVE-2024-22245, CVE-2024-22250)

VMware Enhanced Authentication Plug-in (EAP), a plugin for VMware vSphere, has two vulnerabilities (CVE-2024-22245, CVE-2024-22250) that could be exploited by…

Beyond Identity Device360 identifies device security risks
21
Feb
2024

Beyond Identity Device360 identifies device security risks

Beyond Identity released a new Device360 solution for continuous device security posture management. Device360 is the device security tool designed…

Check Point introduces Quantum Force, series of AI-powered firewalls
21
Feb
2024

Check Point introduces Quantum Force, series of AI-powered firewalls

Check Point introduces Check Point Quantum Force series: a lineup of ten firewalls designed to meet and exceed the stringent…

Active Directory outages can cost organizations $100,000 per day
21
Feb
2024

Active Directory outages can cost organizations $100,000 per day

Nearly every organization has core systems services tied to Active Directory that will go down during an outage, according to…

The importance of a good API security strategy
21
Feb
2024

The importance of a good API security strategy

In 2024, API requests accounted for 57% of dynamic internet traffic around the globe, according to the Cloudflare 2024 API…

10 cybersecurity startups to watch in 2024
21
Feb
2024

10 cybersecurity startups to watch in 2024

At Help Net Security, we’ve been following the cybersecurity business landscape closely for the past 25 years. Through our Industry…

TruffleHog: Open-source solution for scanning secrets
21
Feb
2024

TruffleHog: Open-source solution for scanning secrets

TruffleHog is an open-source scanner that identifies and addresses exposed secrets throughout your entire technology stack. “TruffleHog was originally a…

Alleged Raccoon Infostealer operator extradited, verification site set up for victims
21
Feb
2024

Alleged Raccoon Infostealer operator extradited, verification site set up for victims

A Ukrainian national was extradited to the United States from the Netherlands after being indicted for crimes related to fraud,…

LockBit disrupted by international law enforcement task force
20
Feb
2024

LockBit disrupted by international law enforcement task force

On Monday afternoon, LockBit’s leak site has been taken over by a coalition of law enforcement agencies and is showing…

LockBit takedown: Infrastructure disrupted, criminals arrested, decryption keys recovered
20
Feb
2024

LockBit takedown: Infrastructure disrupted, criminals arrested, decryption keys recovered

In the wake of yesterday’s surprise law enforcement takeover of LockBit’s leak site, the UK National Crime Agency (NCA) and…

Clean links and sophisticated scams mark new era in email attacks
20
Feb
2024

Clean links and sophisticated scams mark new era in email attacks

Analysis of 7 billion emails shows clean links are duping users, malicious EML attachments increased 10-fold in Q4, and social…