Category: HelpnetSecurity

The old, not the new: Basic security issues still biggest threat to enterprises
23
Feb
2024

The old, not the new: Basic security issues still biggest threat to enterprises

In 2023, cybercriminals saw more opportunities to “log in” versus hack into corporate networks through valid accounts – making this…

2024 will be a volatile year for cybersecurity as ransomware groups evolve
23
Feb
2024

2024 will be a volatile year for cybersecurity as ransomware groups evolve

Hackers have significantly increased demands for ransomware, rising over 20% year-over-year to $600,000, according to Arctic Wolf. Organizations are failing…

Microsoft begins broadening free cloud logging capabilities
22
Feb
2024

Microsoft begins broadening free cloud logging capabilities

After select US federal agencies tested Microsoft’s expanded cloud logging capabilities for six months, Microsoft is now making them available…

Cybersecurity fears drive a return to on-premise infrastructure from cloud computing
22
Feb
2024

Cybersecurity fears drive a return to on-premise infrastructure from cloud computing

42% of organizations surveyed in the US are considering or already have moved at least half of their cloud-based workloads…

Attackers exploiting ConnectWise ScreenConnect flaws, fixes available for all users (CVE-2024-1709, CVE-2024-1708)
22
Feb
2024

Attackers exploiting ConnectWise ScreenConnect flaws, fixes available for all users (CVE-2024-1709, CVE-2024-1708)

The two ScreenConnect vulnerabilities ConnectWise has recently urged customers to patch have finally been assigned CVE numbers: CVE-2024-1709 for the…

Attack velocity surges with average breakout time down to only 62 minutes
22
Feb
2024

Attack velocity surges with average breakout time down to only 62 minutes

The speed of cyberattacks continues to accelerate at an alarming rate, according to CrowdStrike. Adversaries increasingly exploit stolen credentials The…

A step-by-step plan for safe use of GenAI models for software development
22
Feb
2024

A step-by-step plan for safe use of GenAI models for software development

If you are a large-scale company, the recent AI boom hasn’t escaped your notice. Today AI is assisting in a…

MSPs undergo transformation in response to persistent cyber threats
22
Feb
2024

MSPs undergo transformation in response to persistent cyber threats

2Organizations are increasingly turning to Managed Service Providers (MSPs) to alleviate pressure on IT departments, according to SonicWall. Managed services…

VMware pushes admins to uninstall vulnerable, deprecated vSphere plugin (CVE-2024-22245, CVE-2024-22250)
21
Feb
2024

VMware pushes admins to uninstall vulnerable, deprecated vSphere plugin (CVE-2024-22245, CVE-2024-22250)

VMware Enhanced Authentication Plug-in (EAP), a plugin for VMware vSphere, has two vulnerabilities (CVE-2024-22245, CVE-2024-22250) that could be exploited by…

Beyond Identity Device360 identifies device security risks
21
Feb
2024

Beyond Identity Device360 identifies device security risks

Beyond Identity released a new Device360 solution for continuous device security posture management. Device360 is the device security tool designed…

Check Point introduces Quantum Force, series of AI-powered firewalls
21
Feb
2024

Check Point introduces Quantum Force, series of AI-powered firewalls

Check Point introduces Check Point Quantum Force series: a lineup of ten firewalls designed to meet and exceed the stringent…

Active Directory outages can cost organizations $100,000 per day
21
Feb
2024

Active Directory outages can cost organizations $100,000 per day

Nearly every organization has core systems services tied to Active Directory that will go down during an outage, according to…