In this Help Net Security interview, Michelle Weston, VP of Security & Resiliency at Kyndryl, discusses the key challenges in security operations and how to address them. The top... Read more »
Bots compose 42% of overall web traffic, and 65% of these bots are malicious, according to Akamai. Negative effects of scraper bots on business operations Web scraping is not... Read more »
Here’s a look at the most interesting products from the past week, featuring releases from ARMO, Cofense, Datadog, and eSentire. Datadog LLM Observability secures generative AI applications Datadog’s LLM... Read more »
The University Hospital Centre Zagreb (KBC Zagreb) is under cyberattack that started on Wednesday night, the Croatian Radiotelevision has reported. Because of the attack, the hospital has shut down... Read more »
Lastwall launched Quantum Shield, a quantum resilient product that protects conventional network infrastructures with the latest quantum cryptographic standards. Lastwall is backed by Blue Bear Capital, BlueWing Ventures, and... Read more »
A critical SQL injection vulnerability in Fortra FileCatalyst Workflow (CVE-2024-5276) has been patched; a PoC exploit is already available online. While there’s currently no reports of in-the-wild exploitation, enterprise... Read more »
Datadog announced LLM Observability, which allows AI application developers and ML engineers to efficiently monitor, improve and secure large language model (LLM) applications. With LLM Observability, companies can accelerate... Read more »
Lattice Semiconductor launched two new solutions to address customer challenges around increasing threats to system security. The company announced the Lattice MachXO5D-NX family of advanced secure control FPGAs, offering... Read more »
A federal grand jury in Maryland returned an indictment charging a Russian citizen with conspiracy to hack into and destroy computer systems and data. If convicted, he faces a... Read more »
Gitleaks is an open-source SAST tool designed to detect and prevent hardcoded secrets such as passwords, API keys, and tokens in Git repositories. With more than 15 million Docker... Read more »
