Huntress acquires security awareness training platform Curricula for $22 million

Huntress, the managed security platform for SMBs, has acquired Curricula, a story-based security awareness training platform that empowers employees to better defend themselves against hackers. In addition to its... Read more »

Up to 90% of governmental websites serve cookies or third-party trackers

In some countries up to 90% of governmental websites add third-party tracker cookies without users’ consent. This occurs even in countries with strict user privacy laws, according to researchers... Read more »

The past, present and future of Metasploit

Metasploit is the most used penetration testing framework. In this Help Net Security video, Spencer McIntyre, Lead Security Researcher at Rapid7, talks about how Metasploit enables defenders to always... Read more »

Why SBOMs aren’t the silver bullet they’re portrayed as

A Software Bill of Materials, often shortened to the acronym SBOM, is a formal, machine-readable inventory of software components and dependencies, information about those components, and their hierarchical relationships.... Read more »

Product showcase: Passwork – the best solution for work with corporate passwords

Passwork aims to enable efficient and secure working processes through the automated management of passwords and corporate accounts. Quickly access all employee credentials. Local system administrators are tasked with... Read more »

Popular business web apps fail to implement critical password requirements

Specops Software released new research finding cybersecurity weaknesses in business web apps including Shopify, Zendesk, Trello, and Stack Overflow. Amid a wave of cybersecurity incidents related to the COVID-19... Read more »

What threats and challenges are CISOs and CROs most focused on?

Cyber executives may not be sufficiently prioritizing threats from vulnerabilities within the value chain, beyond the immediate boundaries of their own organizations, according to Tata Consultancy Services. When asked... Read more »

Orca Security helps enterprises detect cloud attacks with Cloud Detection and Response capabilities

Orca Security, added Cloud Detection and Response (CDR) capabilities to its agentless Cloud Security Platform to help organizations detect, investigate, and respond to in-progress attacks. The Orca Platform analyzes... Read more »

Cato DLP secures and optimizes access to all applications

Cato Networks introduced Cato DLP, a Data Loss Prevention (DLP) engine to protect data across all enterprise applications without complex, cumbersome DLP rules. Cato DLP is part of Cato... Read more »

AB Handshake AI Shield detects voice fraud attacks in real-time

The telecom industry has long been under the threat of fraud. While traditional fraud management systems (FMS) have managed to stop some fraud attacks, there hasn’t been a comprehensive... Read more »
Subscribe to our Newsletter