Category: HelpnetSecurity

Telecom firms hit with novel backdoors disguised as security software
21
Sep
2023

Telecom firms hit with novel backdoors disguised as security software

Researchers have unearthed new backdoors leveraged to maintain long-term access in the networks of telecom firms in the Middle East….

21
Sep
2023

Viavi Observer Sentry provides threat visibility into AWS environments

Viavi Solutions unveiled Observer Sentry, Software-as-a-Service-based Threat Exposure Management providing SecOps, DevOps, and cloud architects much-needed threat visibility into ever-changing…

Dig enhances its platform to protect enterprise data in all storage environments
21
Sep
2023

Dig enhances its platform to protect enterprise data in all storage environments

Dig has expanded the Dig Data Security Platform to protect data anywhere enterprises store sensitive information, including public cloud, software…

Signal takes a quantum leap with E2EE protocol upgrade
21
Sep
2023

Signal takes a quantum leap with E2EE protocol upgrade

Signal has announced an upgrade to its end-to-end encryption (E2EE) protocol to protect users of its popular messaging app from…

Cisco to acquire Splunk in deal valued at $28 billion
21
Sep
2023

Cisco to acquire Splunk in deal valued at $28 billion

Cisco and Splunk announced a definitive agreement under which Cisco intends to acquire Splunk for $157 per share in cash,…

Fake WinRAR PoC spread VenomRAT malware
21
Sep
2023

Fake WinRAR PoC spread VenomRAT malware

An unknown threat actor has released a fake proof of concept (PoC) exploit for CVE-2023-4047, a recently fixed remote code…

Critical Trend Micro vulnerability exploited in the wild (CVE-2023-41179)
21
Sep
2023

Critical Trend Micro vulnerability exploited in the wild (CVE-2023-41179)

Trend Micro has fixed a critical vulnerability (CVE-2023-41179) in several of its endpoint security products for enterprises that has been…

Building GenAI competence for business growth
21
Sep
2023

Building GenAI competence for business growth

To embark on the GenAI technology adoption journey for business success, organizations require foundational activities related to GenAI investment, guidance…

Regulatory pressure complicates cybersecurity for industrial equipment manufacturers
21
Sep
2023

Regulatory pressure complicates cybersecurity for industrial equipment manufacturers

50% of companies lack a dedicated security function for control systems and devices within their organizational structure, according to Cybellum….

How to set up and speed up Amazon S3 Replication for cross-region data replication
21
Sep
2023

How to set up and speed up Amazon S3 Replication for cross-region data replication

Amazon S3 is a simple cloud storage solution enabling effortless storage and retrieval of large amounts of data from different…

How companies can take control of their cybersecurity
21
Sep
2023

How companies can take control of their cybersecurity

In this Help Net Security interview, Baya Lonqueux, CEO at Reciproc-IT, discusses the evolving cybersecurity landscape and the essential skillsets…

Hidden dangers loom for subsea cables, the invisible infrastructure of the internet
21
Sep
2023

Hidden dangers loom for subsea cables, the invisible infrastructure of the internet

More than 97% of the world’s internet traffic passes through subsea cables at some point, according to ENISA. Subsea cables…