Category: HelpnetSecurity

Entrust Cryptographic Security Platform provides visibility into cryptographic risk posture
16
Apr
2025

Entrust Cryptographic Security Platform provides visibility into cryptographic risk posture

Entrust announced the Entrust Cryptographic Security Platform, a unified, end-to-end cryptographic security management solution for keys, secrets, and certificates. Cyberattacks…

Cozy Bear targets EU diplomats with wine-tasting invites (again)
16
Apr
2025

Cozy Bear targets EU diplomats with wine-tasting invites (again)

APT29 (aka Cozy Bear, aka Midnight Blizzard) is, once again, targeting European diplomats with fake invitations to wine-tasting events, Check…

Cyware strengthens threat intelligence management
16
Apr
2025

Cyware strengthens threat intelligence management

Cyware has added Compromised Credential Management to the Cyware Intel Packaged Solution, a pre-configured threat intelligence program-in-a-box that enables security…

Funding uncertainty may spell the end of MITRE's CVE program
16
Apr
2025

Funding uncertainty may spell the end of MITRE’s CVE program

The future of the Common Vulnerabilities and Exposures (CVE) program hangs in the balance: MITRE, the not-for-profit US organization that…

Cato Networks unveils GenAI security controls for Cato CASB
16
Apr
2025

Cato Networks unveils GenAI security controls for Cato CASB

Cato Networks introduced GenAI security controls for Cato CASB (Cloud Access Security Broker). Cato CASB, a native feature in the Cato SASE…

When companies merge, so do their cyber threats
16
Apr
2025

When companies merge, so do their cyber threats

For CISOs, mergers and acquisitions (M&A) bring both potential and risk. These deals can drive growth, but they also open…

Browser extensions make nearly every employee a potential attack vector
16
Apr
2025

Browser extensions make nearly every employee a potential attack vector

Despite being present on virtually every employee’s browser, extensions are rarely monitored by security teams or controlled by IT, according…

Attack Flow: Learn how cyber adversaries combine and sequence offensive techniques
16
Apr
2025

Attack Flow: Learn how cyber adversaries combine and sequence offensive techniques

MITRE’s Attack Flow project aims to translate complex cyber operations into a structured language. By describing how adversaries sequence and…

The future of authentication: Why passwordless is the way forward
16
Apr
2025

The future of authentication: Why passwordless is the way forward

By now, most CISOs agree: passwords are the weakest link in the authentication chain. They’re easy to guess, hard to…

Hertz data breach: Customers in US, EU, UK, Australia and Canada affected
15
Apr
2025

Hertz data breach: Customers in US, EU, UK, Australia and Canada affected

American car rental company Hertz has suffered a data breach linked to last year’s exploitation of Cleo zero-day vulnerabilities by…

PlexTrac for CTEM helps security teams centralize security data
15
Apr
2025

PlexTrac for CTEM helps security teams centralize security data

PlexTrac launched PlexTrac for CTEM, expanding the platform’s capabilities with a proactive and continuous threat exposure management solution designed to…

Critical flaws fixed in Nagios Log Server
15
Apr
2025

Critical flaws fixed in Nagios Log Server

The Nagios Security Team has fixed three critical vulnerabilities affecting popular enterprise log management and analysis platform Nagios Log Server….