David Koenig joins Delinea as CIO

Delinea announced that David Koenig has joined the company as Chief Information Officer (CIO). Koenig assumes leadership of Delinea’s IT strategy and operations, including the company’s infrastructure, business applications,... Read more »

Telecom firms hit with novel backdoors disguised as security software

Researchers have unearthed new backdoors leveraged to maintain long-term access in the networks of telecom firms in the Middle East. HTTPSnoop and PipeSnoop – as the two implants have... Read more »

WatchGuard acquires CyGlass to accelerate AI-based NDR and Open XDR capabilities

WatchGuard Technologies has unveiled the acquisition of CyGlass Technology Services. CyGlass’s 100% cloud native platform utilizes advanced artificial intelligence (AI) and machine learning (ML) capabilities to deliver enterprise-class cyber... Read more »

Juniper Apstra enhancements simplify and standardize data center architectures

Juniper Networks announced new Juniper Apstra capabilities that enhance operator experiences to facilitate the deployment and operations of private data center infrastructures. With the introduction of new experience-first data... Read more »

CyberArk and Accenture join forces to improve identity security for organizations

CyberArk announced that Accenture has expanded its deployment of the CyberArk Identity Security Platform to include CyberArk Privilege Cloud. The solution enables Accenture to control and monitor privileged access... Read more »

Fortress Information Security partners with NetRise to secure software supply chains

Fortress Information Security and NetRise partnered to offer a new, innovative Software Bill of Materials (SBOM) transparency solution to secure software supply chains and meet evolving regulatory requirements for... Read more »

Fake WinRAR PoC spread VenomRAT malware

An unknown threat actor has released a fake proof of concept (PoC) exploit for CVE-2023-4047, a recently fixed remote code execution (RCE) vulnerability in WinRAR, to spread the VenomRAT... Read more »

Critical Trend Micro vulnerability exploited in the wild (CVE-2023-41179)

Trend Micro has fixed a critical zero-day vulnerability (CVE-2023-41179) in several of its endpoint security products for enterprises that has been spotted being exploited in the wild. About CVE-2023-41179... Read more »

How to set up and speed up Amazon S3 Replication for cross-region data replication

Amazon S3 is a simple cloud storage solution enabling effortless storage and retrieval of large amounts of data from different geographies. It’s engineered for scalability, durability, and security, making... Read more »

How companies can take control of their cybersecurity

In this Help Net Security interview, Baya Lonqueux, CEO at Reciproc-IT, discusses the evolving cybersecurity landscape and the essential skillsets needed for teams working in this field. The interview... Read more »
Subscribe to our Newsletter