Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave

Secretive is an open-source, user-friendly app designed to store and manage SSH keys within the Secure Enclave. Typically, SSH keys are stored on disk with appropriate permissions, which is... Read more »

Cybersecurity jobs available right now: July 31, 2024

Cloud Security Architect Precisely | United Kingdom | Remote – View job details As a Cloud Security Architect, you will be responsible for the design and architecture of Precisely’s... Read more »

Leveraging dynamic configuration for seamless and compliant software changes

In this Help Net Security interview, Konrad Niemiec, CEO and Founder of Lekko, discusses the benefits of dynamic configuration in preventing system outages and enabling faster response times during... Read more »

CISA adds VMware ESXi bug to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a VMware ESXi bug to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an authentication bypass... Read more »

Mandrake Android spyware found in five apps in Google Play with over 32,000 downloads since 2022

A new version of the Mandrake Android spyware has been found in five apps on Google Play, which have been downloaded over 32,000 times since 2022. Researchers from Kaspersky... Read more »

Google Workspace Authentication Vulnerability Allowed Thousands of Emails to be Compromised

Hackers managed to compromise “a few thousand” Google Workspace accounts by circumventing the verification process. Read more »

Ransomware Attacks Are Attracting Record Payouts in Australia. Should You Pay the Ransom?

Ransomware attacks are attracting record payouts in Australia. Learn whether paying the ransom is viable, about legal implications and about alternative strategies. Read more »

SideWinder phishing campaign targets maritime facilities in multiple countries

The APT group SideWinder launched a new espionage campaign targeting ports and maritime facilities in the Indian Ocean and Mediterranean Sea. SideWinder (also known as Razor Tiger, Rattlesnake, and... Read more »

Average data breach cost jumps to $4.88 million, collateral damage increased

IBM released its annual Cost of a Data Breach Report revealing the global average cost of a data breach reached $4.88 million in 2024, as breaches grow more disruptive... Read more »

Adaptive Shield unveils ITDR platform for SaaS

Adaptive Shield has unveiled its Identity Threat Detection & Response (ITDR) platform for SaaS environments. The recent Snowflake breach served as a wake-up call for the SaaS industry. On... Read more »
Subscribe to our Newsletter