Category: HelpnetSecurity

Only 45% of organizations use MFA to protect against fraud
07
May
2024

Only 45% of organizations use MFA to protect against fraud

Most businesses struggle with identity verification and have concerns over ability to protect against AI, according to Ping Identity. Despite…

Splunk Asset and Risk Intelligence accelerates security investigations
06
May
2024

Splunk Asset and Risk Intelligence accelerates security investigations

Splunk announced Splunk Asset and Risk Intelligence, a solution designed to power the SOC of the future by helping businesses…

BlackBasta claims Synlab attack, leaks some stolen documents
06
May
2024

BlackBasta claims Synlab attack, leaks some stolen documents

The BlackBasta ransomware / cyber extortion gang is behind the recent cyber attack that resulted in the temporary shutdown of…

How to prepare for the CISSP exam: Tips from industry leaders
06
May
2024

How to prepare for the CISSP exam: Tips from industry leaders

The Certified Information Systems Security Professional (CISSP) is the most widely recognized certification in the information security industry. CISSP certifies…

Strategies for preventing AI misuse in cybersecurity
06
May
2024

Strategies for preventing AI misuse in cybersecurity

As organizations increasingly adopt AI, they face unique challenges in updating AI models to keep pace with evolving threats while…

Organizations go ahead with AI despite security risks
06
May
2024

Organizations go ahead with AI despite security risks

AI adoption remains sky high, with 54% of data experts saying that their organization already leverages at least four AI…

Privacy requests increased 246% in two years
06
May
2024

Privacy requests increased 246% in two years

Data Subject Requests (DSRs) — formal requests made to a company by a person to access, delete, or request not…

eBook: CISSP fundamentals in focus
06
May
2024

eBook: CISSP fundamentals in focus

From the technical tools that help manage access control to non-technical skills like collaboration, learn about the fundamentals required in…

Week in review: PoCs allow persistence on Palo Alto firewalls, Okta credential stuffing attacks
05
May
2024

Week in review: PoCs allow persistence on Palo Alto firewalls, Okta credential stuffing attacks

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Palo Alto firewalls: CVE-2024-3400 exploitation…

Bug hunters can get up to $450,000 for an RCE in Google's Android apps
03
May
2024

Bug hunters can get up to $450,000 for an RCE in Google’s Android apps

Google has drastically increased the rewards bug hunters can get for reporting vulnerabilities in Android apps it develops and maintains….

Microsoft, Google widen passkey support for its users
03
May
2024

Microsoft, Google widen passkey support for its users

Since 2013, the first Thursday in May is marked as World Password Day, a day dedicated to raising awareness about…

Trellix Wise automates security workflows with AI, streamlining threat detection and remediation
03
May
2024

Trellix Wise automates security workflows with AI, streamlining threat detection and remediation

Trellix has unveiled Trellix Wise, a powerful suite of traditional and Generative Artificial Intelligence (GenAI) tools to drastically reduce cyber…