Jupyter Notebooks targeted by cryptojackers

Cryptojackers are targeting exposed Jupyter Notebooks to install cryptominers and steal credential files for popular cloud services, researchers have uncovered. What are Jupyter Notebooks? “Jupyter is a service that... Read more »

Prove Identity raises $40 million to boost its digital identity solutions

Prove Identity has announced a $40 million funding round led by MassMutual Ventures and Capital One Ventures. The funds will be used to launch new commerce enablement and fraud-fighting... Read more »

10 essential cybersecurity cheat sheets available for free

Cheat sheets are concise, to-the-point references tailored for instant insights. This article provides a curated list of 10 essential cybersecurity cheat sheets, all free to download. Whether you’re seeking... Read more »

The evolution of deception tactics from traditional to cyber warfare

Admiral James A. Winnefeld, USN (Ret.), is the former vice chairman of the Joint Chiefs of Staff and is an advisor to Acalvio Technologies. In this Help Net Security... Read more »

SMBs seek help as cyber threats reach an all-time high

Understanding the evolving threat landscape is the biggest cybersecurity challenge facing SMBs, including non-for-profit organizations – and more than half are calling for help to manage the risks, according... Read more »

Generative AI merges with intelligent malware, threat level rises

There has been a 44% increase in organized ID fraud in North America compared to preceding quarters, according to AU10TIX. This upsurge is believed to be driven by the... Read more »

Secure source code but vulnerable app: Tackle compiler-born vulnerabilities

In the pursuit of optimized performance, modern compilers employ sophisticated techniques, translating high-level source code into efficient, executable programs. However, this advanced translation sometimes inadvertently weaves vulnerabilities into the... Read more »

Prevalent Alfred improves third-party risk management

Prevalent introduced Alfred, a virtual third-party risk advisor. Alfred is available in the Prevalent TPRM Platform and is the latest capability delivered as part of Prevalent’s broader strategy to... Read more »

BackBox Network Vulnerability Manager identifies vulnerabilities and classifies them by threat level

BackBox launched Network Vulnerability Manager (NVM). With this new capability added to its existing Network Automation Platform, BackBox integrates automated OS upgrades and network configuration management capabilities with network... Read more »

Verint PII Redaction Bot protects sensitive data

Verint launched the Verint Personal Identifiable Information (PII) Redaction Bot giving organizations a way to automate compliance, reduce risk, and protect their customers’ sensitive personal data such as credit... Read more »
Subscribe to our Newsletter