Category: HelpnetSecurity

3 CIS resources to help you drive your cloud cybersecurity
09
May
2024

3 CIS resources to help you drive your cloud cybersecurity

In the process of moving to the cloud, you need a security-first cloud migration strategy that considers both your security…

Cado Security launches solution for forensic investigations in distroless container environments
08
May
2024

Cado Security launches solution for forensic investigations in distroless container environments

Cado Security has introduced a solution for conducting forensic investigations in distroless container environments. With Cado Security’s new offering, security…

SentinelOne Singularity Cloud Native Security simulates harmless attacks on cloud infrastructure
08
May
2024

SentinelOne Singularity Cloud Native Security simulates harmless attacks on cloud infrastructure

Attackers are targeting the scope and scale of the cloud to run rapid and coordinated threat campaigns. A new approach…

Attackers may be using TunnelVision to snoop on users' VPN traffic (CVE-2024-3661)
08
May
2024

Attackers may be using TunnelVision to snoop on users’ VPN traffic (CVE-2024-3661)

Researchers have brought to light a new attack method – dubbed TunnelVision and uniquely identified as CVE-2024-3661 – that can…

MITRE breach details reveal attackers' successes and failures
08
May
2024

MITRE breach details reveal attackers’ successes and failures

MITRE has shared a timeline of the recent breach if fell victim to and has confirmed that it began earlier…

Photos: RSA Conference 2024 - Help Net Security
08
May
2024

Photos: RSA Conference 2024 – Help Net Security

RSA Conference 2024 is taking place at the Moscone Center in San Francisco. Help Net Security is on-site, and this…

Forcepoint ONE Data Security simplifies data protection with zero-trust principles for all organizations
08
May
2024

Forcepoint ONE Data Security simplifies data protection with zero-trust principles for all organizations

Forcepoint introduced Forcepoint ONE Data Security, an enterprise-grade unified cloud-managed solution designed to simplify data protection with zero-trust principles for…

AppOmni introduces ZTPM for enhanced cisibility in SaaS security
08
May
2024

AppOmni introduces ZTPM for enhanced cisibility in SaaS security

AppOmni unveiled AppOmni Zero Trust Posture Management (ZTPM), a solution set that strengthens security in modern infrastructures by bridging a…

Eclypsium offers protection for GenAI hardware infrastructure
08
May
2024

Eclypsium offers protection for GenAI hardware infrastructure

Eclypsium announced new GenAI assessment capabilities for its Supply Chain Security Platform. The new capabilities help secure the fundamental layers…

Pktstat: Open-source ethernet interface traffic monitor
08
May
2024

Pktstat: Open-source ethernet interface traffic monitor

Pktstat is an open-source tool that is a straightforward alternative to ncurses-based Pktstat. On Linux, it utilizes AF_PACKET, while on…

97% of organizations hit by ransomware turn to law enforcement
08
May
2024

97% of organizations hit by ransomware turn to law enforcement

Sophos has released additional findings from its annual “State of Ransomware 2024” survey. According to the report, among organizations surveyed,…

Security tools fail to translate risks for executives
08
May
2024

Security tools fail to translate risks for executives

Organizations are struggling with internal communication barriers, which hinder their ability to address cybersecurity threats, according to Dynatrace. The results…