CyberArk Endpoint Privilege Manager protects Linux systems by enforcing least privilege policies

CyberArk announced new CyberArk Endpoint Privilege Manager functionality that extends protection to Linux platforms. Now, security and IT professionals can easily enforce least privilege and implement foundational just-in-time security... Read more »

Immersive Labs Cyber Team Sim prepares teams for real-life cyber attacks

Immersive Labs announced the launch of technical multiplayer simulations, including scenarios for both offensive and defensive teams in complex environments. This capability offers security teams the ability to use... Read more »

Portnox unveils new cloud-native tool to help midmarket businesses simplify network security

Portnox released a cloud-native Terminal Access Controller Access Control Server (TACACS+) solution to help midmarket businesses manage network device administration and access management across increasingly distributed networks. “We are... Read more »

Criminal IP analysis report on zero-day vulnerability in Atlassian Confluence

According to Volexity, a webshell was discovered in Atlassian Confluence server during an incident response investigation. Volexity determined that it was a zero-day vulnerability that could execute remote code... Read more »

New infosec products of the week: June 17, 2022

Here’s a look at the most interesting products from the past week, featuring releases from Black Kite, Feroot, Incognia, Optiv, and Splunk. Splunk announces platform updates to address the... Read more »

How financial institutions are improving customer experience with fraud prevention measures

Fraud is a persistent threat, and there’s no end in sight as the e-commerce landscape continues to evolve and the use of online payment platforms increases. According to one... Read more »

Cyber criminals continue to target and exploit people

Proofpoint unveiled its annual Human Factor report, which provides a comprehensive examination of the three main facets of user risk — vulnerability, attacks, and privilege — and how threat... Read more »

Fraud trends and scam tactics consumers should be aware of

If it seems like you’re receiving more spam than normal, you probably are. Seventy-four percent of consumers say they have received a scam text so far this year, while... Read more »

66% of organizations store 21%-60% of their sensitive data in the cloud

A Thales report, conducted by 451 Research, reveals that 45% of businesses have experienced a cloud-based data breach or failed audit in the past 12 months, up 5% from... Read more »

How social engineering attacks are evolving beyond email

In this Help Net Security video, Chris Lehman, CEO at SafeGuard Cyber, talks about how adversaries are moving beyond email to attack companies through a wide range of digital... Read more »
Subscribe to our Newsletter