Category: HelpnetSecurity

Attackers hit software firm Retool to get to crypto companies and assets
14
Sep
2023

Attackers hit software firm Retool to get to crypto companies and assets

Retool, the company behind the popular development platform for building internal business software, has suffered a breach that allowed attackers…

Access control in cloud-native applications in multi-location environments (NIST SP 800-207)
14
Sep
2023

Access control in cloud-native applications in multi-location environments (NIST SP 800-207)

NIST released Special Publication (SP) 800-207A – “A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Location…

Librem 11 tablet sets new standard for privacy and security with Linux-based PureOS
14
Sep
2023

Librem 11 tablet sets new standard for privacy and security with Linux-based PureOS

Purism introduced the new Librem 11 tablet running secure PureBoot and Linux kernel-based PureOS. Librem 11 is made for individuals,…

Download: Ultimate guide to Certified in Cybersecurity
14
Sep
2023

Download: Ultimate guide to Certified in Cybersecurity

The ultimate guide covers everything you need to know about the entry-level Certified in Cybersecurity certification and how to get…

Great security training is a real challenge
14
Sep
2023

Great security training is a real challenge

All employees need security training, yet it’s generally a resented afterthought. A variety of studies over years show that human…

Mobile Verification Toolkit: Forensic analysis of Android and iOS devices to identify compromise
14
Sep
2023

Mobile Verification Toolkit: Forensic analysis of Android and iOS devices to identify compromise

Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful…

Rising OT/ICS cybersecurity incidents reveal alarming trend
14
Sep
2023

Rising OT/ICS cybersecurity incidents reveal alarming trend

60% of cyberattacks against the industrial sector are led by state-affiliated actors and often unintentionally enabled by internal personnel (about…

Armis Centrix delivers a modular approach to cyber exposure management
13
Sep
2023

Armis Centrix delivers a modular approach to cyber exposure management

Armis has launched Armis Centrix, the AI-powered cyber exposure management platform. Armis Centrix is a seamless, frictionless, cloud-based platform that…

Cisco Secure Application provides business risk insights for cloud native apps
13
Sep
2023

Cisco Secure Application provides business risk insights for cloud native apps

Cisco has unveiled Cisco Secure Application (previously Security Insights for Cloud Native Application Observability) on the Cisco Full-Stack Observability Platform,…

MetaStealer malware is targeting enterprise macOS users
13
Sep
2023

MetaStealer malware is targeting enterprise macOS users

Enterprise macOS users are being targeted by attackers slinging new information-stealing malware dubbed MetaStealer. The MetaStealer malware MetaStealer is delivered…

How should SMBs navigate the phishing minefield?
13
Sep
2023

How should SMBs navigate the phishing minefield?

In this Help Net Security interview, Pete Hoff, CISO at Wursta, offers advice to SMB security leaders and professionals on…

Serial cybersecurity founders get back in the game
13
Sep
2023

Serial cybersecurity founders get back in the game

“I didn’t really have a choice,” says Ben Bernstein, the former CEO and co-founder of Twistlock (acquired by Palo Alto…