Rayhunter: EFF releases open-source tool to detect cellular spying

The Electronic Frontier Foundation (EFF) has released Rayhunter, a new open-source tool designed to detect cell site simulators (CSS). These devices, also known as IMSI catchers or Stingrays, mimic... Read more »

Bots vs. humans? Why intent is the game-changer

In this Help Net Security video, Jérôme Segura, VP of Threat Research at Datadome, explains why intent, not just identifying bots, must be the new focus for cybersecurity teams.... Read more »

Old file types, new tricks: Attackers turn everyday files into weapons

Attackers are finding new ways to blend in with everyday business tools, hiding their activity inside formats and processes that workers and IT teams often trust. The latest quarterly... Read more »

Self-replicating worm hits 180+ npm packages in (largely) automated supply chain attack

A potentially monumental supply chain attack is underway, thanks to a self-replicating worm-like payload that has been compromising packages published on the npm Registry. The worm has been dubbed... Read more »

Sentra enables organizations to leverage Copilot without compromising security

Sentra launched its solution for securing Microsoft 365 Copilot, enabling organizations to adopt Copilot with confidence while remaining compliant and protecting sensitive enterprise data. The solution allows organizations to... Read more »

Neon Cyber exits stealth with Workforce Cybersecurity Platform

Neon Cyber announced its emergence from stealth and unveiled the first Workforce Cybersecurity Platform (WCP), delivering protection across browsers, SaaS applications and enterprise systems in every department. Built by... Read more »

Digital.ai brings expert-level cryptography to any developer team

Digital.ai released its App Sec White-box Cryptography Agent to simplify application security for developers and help customers ensure that every application requiring protection is secured. The Agent makes white-box... Read more »

Ransomware attackers used incorrectly stored recovery codes to disable EDR agents

All target organizations are different, but ransomware attackers are highly adaptive and appreciate – and will exploit – any mistake you make. The latest Akira ransomware attacks Managed security... Read more »

N-able strengthens backup threat protection

N-able has enhanced the capabilities of Cove Data Protection with the launch of Anomaly Detection as a Service (ADaaS). Strengthening Cove’s defense against cyberthreats, this service is built into... Read more »

GitHub adds post-quantum protection for SSH access

GitHub is adding post-quantum cryptography to secure SSH connections, a move that signals the company’s preparation for a time when current encryption may no longer be safe. What GitHub... Read more »
Subscribe to our Newsletter