Which stolen data are ransomware gangs most likely to disclose?

If your organization gets hit by a ransomware gang that has also managed to steal company data before hitting the “encrypt” button, which types of data are more likely... Read more »

Datadog Observability Pipelines empowers organizations to manage telemetry data

Datadog launched Datadog Observability Pipelines, a new product that enables organizations to take greater control of their data so they can reliably scale their observability practices. Datadog Observability Pipelines... Read more »

Businesses deal with increasing bot attacks

Netacea released its report into how businesses are dealing with bot attacks. It reveals one key area where businesses are failing to tackle bot attacks — bots are going... Read more »

CyberArk Endpoint Privilege Manager protects Linux systems by enforcing least privilege policies

CyberArk announced new CyberArk Endpoint Privilege Manager functionality that extends protection to Linux platforms. Now, security and IT professionals can easily enforce least privilege and implement foundational just-in-time security... Read more »

Immersive Labs Cyber Team Sim prepares teams for real-life cyber attacks

Immersive Labs announced the launch of technical multiplayer simulations, including scenarios for both offensive and defensive teams in complex environments. This capability offers security teams the ability to use... Read more »

Portnox unveils new cloud-native tool to help midmarket businesses simplify network security

Portnox released a cloud-native Terminal Access Controller Access Control Server (TACACS+) solution to help midmarket businesses manage network device administration and access management across increasingly distributed networks. “We are... Read more »

Criminal IP analysis report on zero-day vulnerability in Atlassian Confluence

According to Volexity, a webshell was discovered in Atlassian Confluence server during an incident response investigation. Volexity determined that it was a zero-day vulnerability that could execute remote code... Read more »

New infosec products of the week: June 17, 2022

Here’s a look at the most interesting products from the past week, featuring releases from Black Kite, Feroot, Incognia, Optiv, and Splunk. Splunk announces platform updates to address the... Read more »

How financial institutions are improving customer experience with fraud prevention measures

Fraud is a persistent threat, and there’s no end in sight as the e-commerce landscape continues to evolve and the use of online payment platforms increases. According to one... Read more »

Cyber criminals continue to target and exploit people

Proofpoint unveiled its annual Human Factor report, which provides a comprehensive examination of the three main facets of user risk — vulnerability, attacks, and privilege — and how threat... Read more »
Subscribe to our Newsletter