Behavioral patterns of ransomware groups are changing

Q1 saw substantial shifts in activity from some of the most prolific Ransomware-as-a-Service (RaaS) groups, according to GuidePoint Security. RaaS groups attempt to recruit disaffected or displaced affiliates In... Read more »

apexanalytix Passkeys protects data with biometric authentication

apexanalytix launched Passkeys, a feature that enables suppliers to securely log into their accounts using biometrics like a fingerprint or face scan, or a screen lock PIN. The latest... Read more »

Binary Defense enhances BDVision to improve security for SMBs

Binary Defense announced several important updates to BDVision, the company’s real-time detection and containment Managed Endpoint Detection & Response (mEDR) solution. These critical updates – which include new deception... Read more »

MITRE breached by nation-state threat actor via Ivanti zero-days

MITRE has been breached by attackers via two zero-day vulnerabilities (CVE-2023-46805, CVE-2024-21887) in Ivanti’s Connect Secure VPN devices. The attackers have also managed to move laterally and compromise the... Read more »

Trend Micro launches AI-driven cyber risk management capabilities

Trend Micro unveiled AI-driven cyber risk management capabilities across its entire flagship platform, Trend Vision One. This seamlessly integrates more than 10 industry technology categories into one offering, empowering... Read more »

The first steps of establishing your cloud security strategy

In this article, we’ll identify some first steps you can take to establish your cloud security strategy. We’ll do so by discussing the cloud security impact of individual, concrete... Read more »

How to optimize your bug bounty programs

In this Help Net Security interview, Roy Davis, Manager – Vulnerability Management & Bug Bounty at Zoom, discusses the role bug bounty programs play in identifying security vulnerabilities and... Read more »

Cloud Console Cartographer: Open-source tool helps security teams transcribe log activity

Cloud Console Cartographer is an open-source tool that maps noisy log activity into highly consolidated, succinct events to help security practitioners cut through the noise and understand console behavior... Read more »

Fuxnet malware: Growing threat to industrial sensors

In this Help Net Security video, Sonu Shankar, Chief Strategy Officer at Phosphorus, discusses how Blackjack’s Fuxnet malware should be a wakeup call to industrial operators about the vulnerability... Read more »

Uncertainty is the most common driver of noncompliance

Most compliance leaders tend to focus on building an ethical culture in their organizations to improve employee behavior, but it has a limited impact on addressing uncertainty about how... Read more »
Subscribe to our Newsletter