Category: HelpnetSecurity

Zywave enhances Cyber Quoting to provide insight into coverage limit adequacy and potential loss gaps
07
Nov
2024

Zywave enhances Cyber Quoting to provide insight into coverage limit adequacy and potential loss gaps

Zywave announced an enhancement to its Cyber Quoting solution with the addition of embedded benchmarking. Brokers can now leverage industry…

AWS security essentials for managing compliance, data protection, and threat detection
07
Nov
2024

AWS security essentials for managing compliance, data protection, and threat detection

AWS offers a comprehensive suite of security tools to help organizations manage compliance, protect sensitive data, and detect threats within…

Consumer privacy risks of data aggregation: What should organizations do?
07
Nov
2024

Consumer privacy risks of data aggregation: What should organizations do?

In September 2024, the Federal Trade Commission (FTC) released an eye-opening report that digs into the data habits of nine…

Atakama introduces DNS filtering designed for MSPs
06
Nov
2024

Atakama introduces DNS filtering designed for MSPs

Atakama announced the latest expansion of its Managed Browser Security Platform, introducing DNS filtering explicitly designed for Managed Service Providers…

GoZone ransomware accuses and threatens victims
06
Nov
2024

GoZone ransomware accuses and threatens victims

A new ransomware dubbed GoZone is being leveraged by attackers that don’t seem to be very greedy: they are asking…

Authlete 3.0 empowers organizations to improve how they issue and manage user credentials
06
Nov
2024

Authlete 3.0 empowers organizations to improve how they issue and manage user credentials

Authlete launched Authlete 3.0, offering support for OpenID for Verifiable Credential Issuance (OID4VCI). This new capability empowers organizations—including governments, financial…

Symbiotic provides developers with real-time feedback on potential security vulnerabilities
06
Nov
2024

Symbiotic provides developers with real-time feedback on potential security vulnerabilities

Symbiotic Security launched a real-time security for software development that combines detection and remediation with just-in-time training – incorporating security…

Osmedeus: Open-source workflow engine for offensive security
06
Nov
2024

Osmedeus: Open-source workflow engine for offensive security

Osmedeus is an open-source workflow engine designed for offensive security. It serves as a versatile foundation, enabling users to easily…

The cybersecurity gender gap: How diverse teams improve threat response
06
Nov
2024

The cybersecurity gender gap: How diverse teams improve threat response

In this Help Net Security interview, Julie Madhusoodanan, Head of CyberSecurity at LinkedIn, discusses how closing the gender gap could…

Identity-related data breaches cost more than average incidents
06
Nov
2024

Identity-related data breaches cost more than average incidents

Identity-related data breaches are more severe and costly than run-of-the-mill incidents, according to RSA. 40% of respondents reported an identity-related…

Beware of phishing emails delivering backdoored Linux VMs!
05
Nov
2024

Beware of phishing emails delivering backdoored Linux VMs!

Unknown attackers are trying to trick Windows users into spinning up a custom Linux virtual machine (VM) with a pre-configured…

Google patches actively exploited Android vulnerability (CVE-2024-43093)
05
Nov
2024

Google patches actively exploited Android vulnerability (CVE-2024-43093)

Google has delivered fixes for two vulnerabilities endangering Android users that “may be under limited, targeted exploitation”: CVE-2024-43047, a flaw…