Category: HelpnetSecurity

Inadequate IoT protection can be a costly mistake
16
Oct
2023

Inadequate IoT protection can be a costly mistake

97% of organizations are struggling to secure their IoT and connected products to some degree, according to Keyfactor. The research…

Week in review: Patched curl and libcurl vulnerability, 15 free M365 security training modules
15
Oct
2023

Week in review: Patched curl and libcurl vulnerability, 15 free M365 security training modules

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Turning military veterans into cybersecurity…

Quantum risk is real now: How to navigate the evolving data harvesting threat
13
Oct
2023

Quantum risk is real now: How to navigate the evolving data harvesting threat

In an era where data security is paramount, the recent revelations about firmware backdoors implanted by Chinese government-backed hackers serve…

New infosec products of the week: October 13, 2023
13
Oct
2023

New infosec products of the week: October 13, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Appdome, Flexxon, Fortanix, Fortinet, SailPoint,…

Stronger ransomware protection finally pays off
13
Oct
2023

Stronger ransomware protection finally pays off

60% of companies are ‘very’ to ‘extremely’ concerned about ransomware attacks, according to latest research from Hornetsecurity. Businesses acknowledge ransomware…

AI-enabled bots can solve CAPTCHAs faster than humans
13
Oct
2023

AI-enabled bots can solve CAPTCHAs faster than humans

Companies are losing revenue in the fight against malicious bot attacks, according to survey by Kasada. Despite spending millions of…

Check Point Quantum SASE protects hybrid work and cloud networks
12
Oct
2023

Check Point Quantum SASE protects hybrid work and cloud networks

Check Point launched Quantum SASE, integrating technologies from newly acquired Perimeter 81. This integrated offering addresses organizations’ needs for a…

Microsoft Defender can automatically contain compromised user accounts
12
Oct
2023

Microsoft Defender can automatically contain compromised user accounts

The “contain user” feature select Microsoft Defender for Endpoint customers have been trying out since November 2022 is now available…

As biohacking evolves, how vulnerable are we to cyber threats?
12
Oct
2023

As biohacking evolves, how vulnerable are we to cyber threats?

Can our bodies be hacked? The answer may be yes, in that anyone can implant a chip under the skin…

Yeti: Open, distributed, threat intelligence repository
12
Oct
2023

Yeti: Open, distributed, threat intelligence repository

Yeti serves as a unified platform to consolidate observables, indicators of compromise, TTPs, and threat-related knowledge. It enhances observables automatically,…

Sic Permission Slip on data brokers that use your data
12
Oct
2023

Sic Permission Slip on data brokers that use your data

Permission Slip, an iPhone and Android app developed by Consumer Reports, helps users ask companies and data brokers to stop…

Keeping up with the demands of the cyber insurance market
12
Oct
2023

Keeping up with the demands of the cyber insurance market

Cyber insurance has been around longer than most of us think. When American International Group (AIG) launched the first cyber…