Category: HelpnetSecurity

Software supply chain attacks are getting easier
24
Jan
2024

Software supply chain attacks are getting easier

ReversingLabs identified close to 11,200 unique malicious packages across three major open-source software platforms in 2023: npm, PyPI, and RubyGems….

Onfido Compliance Suite simplifies local and global identity verification
23
Jan
2024

Onfido Compliance Suite simplifies local and global identity verification

Onfido launched its Compliance Suite, an all-in-one identity verification solution that empowers fast-growth businesses to expand seamlessly into new markets…

Apple debuts new feature to frustrate iPhone thieves
23
Jan
2024

Apple debuts new feature to frustrate iPhone thieves

Besides fixing an actively exploited zero-day vulnerability, the latest update for the iOS 17 branch offers a new feature to…

Veriti Odin utilizes AI algorithms to detect and analyze threats
23
Jan
2024

Veriti Odin utilizes AI algorithms to detect and analyze threats

Veriti launched its AI powered contextual cybersearch solution, Veriti Odin. Leveraging advanced AI architecture, Odin is designed to optimize and…

Atakama Browser Security Platform improves security for MSPs
23
Jan
2024

Atakama Browser Security Platform improves security for MSPs

Atakama unveild the Atakama Browser Security Platform for MSPs. Developed in collaboration with 30-plus MSP design partners, over the past…

Apple fixes actively exploited WebKit zero-day (CVE-2024-23222)
23
Jan
2024

Apple fixes actively exploited WebKit zero-day (CVE-2024-23222)

Apple has fixed an actively exploited zero-day vulnerability (CVE-2024-23222) that affects Macs, iPhones, iPads and AppleTVs. About CVE-2024-23222 CVE-2024-23222 is…

Organizations need to switch gears in their approach to email security
23
Jan
2024

Organizations need to switch gears in their approach to email security

Email security risks remain high with 94% of organizations experiencing incidents in the past 12 months, according to Egress. Inbound…

Beyond blockchain: Strategies for seamless digital asset integration
23
Jan
2024

Beyond blockchain: Strategies for seamless digital asset integration

In this Help Net Security interview, Jean-Philippe Aumasson, CSO at Taurus, emphasizes the often-overlooked complexities of key generation, storage, and…

Why cyberattacks mustn’t be kept secret
23
Jan
2024

Why cyberattacks mustn’t be kept secret

No company is immune to cyberattacks, but when the inevitable happens, too many companies still try to maintain a wall…

2024 brings new risks, with cyber incidents in the spotlight
23
Jan
2024

2024 brings new risks, with cyber incidents in the spotlight

Cyber incidents such as ransomware attacks, data breaches, and IT disruptions are the biggest worry for companies globally in 2024,…

Attackers can steal NTLM password hashes via calendar invites
22
Jan
2024

Attackers can steal NTLM password hashes via calendar invites

A recently patched vulnerability in Microsoft Outlook (CVE-2023-35636) that can be used by attackers to steal users’ NTLM v2 hashes…

New method to safeguard against mobile account takeovers
22
Jan
2024

New method to safeguard against mobile account takeovers

Computer science researchers have developed a new way to identify security weaknesses that leave people vulnerable to account takeover attacks,…