Category: HelpnetSecurity

24
Mar
2023

Top ways attackers are targeting your endpoints

Over the last several years, endpoints have played a crucial role in cyberattacks. While there are several steps organizations can…

24
Mar
2023

Vectra Match helps security teams accelerate threat hunting and investigation workflows

Vectra Match brings intrusion detection signature context to Vectra Network Detection and Response (NDR), enabling security teams to accelerate their…

24
Mar
2023

Brivo expands mobile credentials by adding employee badge to Apple Wallet

Brivo expands its mobile credential options by introducing support for employee badges in Apple Wallet. Brivo corporate customers can enable…

23
Mar
2023

Fake ChatGPT for Google extension hijacks Facebook accounts

A new Chrome extension promising to augment users’ Google searches with ChatGPT also leads to hijacked Facebook accounts, Guardio Labs…

23
Mar
2023

A common user mistake can lead to compromised Okta login credentials

Logged failed logins into a company’s Okta domain could be used by threat actors to discover access credentials of valid…

23
Mar
2023

Vumetric PTaaS platform simplifies cybersecurity assessments for organizations

Vumetric Cybersecurity has launched its Penetration Testing as-a-Service (PTaaS) platform, designed to simplify and modernize cybersecurity assessments for organizations of…

23
Mar
2023

A closer look at TSA’s new cybersecurity requirements for aviation

The Transportation Security Administration (TSA) recently issued new cybersecurity requirements for the aviation industry, which follows last year’s announcement for…

23
Mar
2023

Cyber threats to EU transport sector sends urgent call for enhanced cybersecurity

Between January 2021 and October 2022, the EU Agency for Cybersecurity (ENISA) analyzed and mapped the cyber threats faced by…

23
Mar
2023

Top 5 security risks for enterprise storage, backup devices

An average enterprise storage and backup device has 14 vulnerabilities, three of which are high or critical risk that could…

22
Mar
2023

GNOME 44 features improved settings panels for Device Security

GNOME 44, code-named Kuala Lumpur, is now available. The GNOME Circle now includes many new apps, and both the Software…

22
Mar
2023

Verosint SignalPrint identifies potentially malicious accounts

Verosint announced a new solution that helps organizations secure their online businesses and protect their customers in the face of…

22
Mar
2023

These 15 European startups are set to take the cybersecurity world by storm

Google has announced the startups chosen for its Cybersecurity Startups Growth Academy. The 15 selected startups are from eight countries…