Palo Alto firewalls: CVE-2024-3400 exploitation and PoCs for persistence after resets/upgrades

There are proof-of-concept techniques allowing attackers to achieve persistence on Palo Alto Networks firewalls after CVE-2024-3400 has been exploited, the company has confirmed on Monday, but they are “not... Read more »

Cybersixgill Third-Party Intelligence module identifies potential supply chain risks

Cybersixgill, the global cyber threat intelligence data provider, broke new ground by introducing its Third-Party Intelligence module. The new module delivers vendor-specific cybersecurity and threat intelligence to organizations’ security... Read more »

ESET launches two MDR subscription tiers for SMBs and enterprises

ESET launched two new Managed Detection and Response (MDR) subscription tiers: ESET PROTECT MDR for small and medium businesses (SMBs) and ESET PROTECT MDR Ultimate for enterprises. These offerings... Read more »

ThreatX provides always-active API security from development to runtime

ThreatX has extended its Runtime API and Application Protection (RAAP) offering to provide always-active API security from development to runtime, spanning vulnerability detection at Dev phase to protection at... Read more »

CyberQP unveils solutions to help MSPs proactively prevent security incidents

CyberQP announced QGuard Pro, a solution with enhanced capabilities designed to exponentially increase technician efficiency, and a new API for Deployment are now generally available. QGuard Pro comes with... Read more »

Triangulation fraud: The costly scam hitting online retailers

In this Help Net Security interview, Mike Lemberger, Visa’s SVP, Chief Risk Officer, North America, discusses the severe financial losses resulting from triangulation fraud, estimating monthly losses to range... Read more »

Tracecat: Open-source SOAR

Tracecat is an open-source automation platform for security teams. The developers believe security automation should be accessible to everyone, especially understaffed small- to mid-sized teams. Core features, user interfaces,... Read more »

Why the automotive sector is a target for email-based cyber attacks

While every organization across every vertical is at risk of advanced email attacks, certain industries periodically become the go-to target for threat actors. In this Help Net Security video,... Read more »

Passwords under seven characters can be easily cracked

Any password under seven characters can be cracked within a matter of hours, according to Hive Systems. The time it takes to crack passwords increases Due to the widespread... Read more »

Security analysts believe more than half of tasks could be automated

Security industry leaders believe that AI and automation technologies are critical to addressing the complexities of modern security operations, according to Anomali. AI expected to boost threat detection In... Read more »
Subscribe to our Newsletter