ThreatHunter.ai FIRST EYES helps organizations mitigate cyber threats

ThreatHunter.ai launched FIRST EYES, a solution intended to aid organizations lacking strong cybersecurity measures in handling possible threats and defending against the increasing frequency of cyber assaults. FIRST EYES... Read more »

MSPAlliance Cyber Verify helps MSPs achieve compliance

MSPAlliance unveiled Cyber Verify, a Compliance-as-a-Service platform that not only facilitates MSPs in achieving compliance but also enables them to offer compliance services to their customers. The platform has... Read more »

Wipro releases 5G Def-i to accelerate connectivity integrations

Wipro has launched its “5G Def-i” platform which empowers businesses to seamlessly transform their infrastructure, networks and services. Many organizations have failed to maximize their return on connectivity investments... Read more »

Attackers increasingly using transfer.sh to host malicious code

For many years now, unsecured internet-facing Redis servers have been steadily getting co-opted by criminals to mine cryptocurrency, so the latest cryptojacking campaign spotted by Cado Labs researcher cannot... Read more »

US government puts cybersecurity at forefront with newly announced National Strategy

The National Cybersecurity Strategy was unveiled today by the Biden-Harris Administration. The Strategy recognizes that government must use all tools of national power in a coordinated manner to protect... Read more »

BlackLotus UEFI bootkit disables Windows security mechanisms

ESET researchers have published the first analysis of a UEFI bootkit capable of circumventing UEFI Secure Boot, a critical platform security feature. The functionality of the bootkit and its... Read more »

Uncovering the most pressing cybersecurity concerns for SMBs

In this Help Net Security video interview, James Edgar, CISO at Fleetcor, discusses what consequences SMBs are most concerned about when it comes to cyberattacks, what technology SMBs are... Read more »

Moving target defense must keep cyber attackers guessing

A cybersecurity technique that shuffles network addresses like a blackjack dealer shuffles playing cards could effectively befuddle hackers gambling for control of a military jet, commercial airliner, or spacecraft,... Read more »

Don’t be fooled by a pretty icon, malicious apps hide in plain sight

Apps, whether for communication, productivity or gaming, are one of the biggest threats to mobile security, according to McAfee. The end of 2022 saw the release of some game-changing... Read more »

Cyber resilience in focus: EU act to set strict standards

With the EU Cyber Resilience Act (CRA), the industry is dealing with one of the strictest regulatory requirements. Manufacturers, importers and even distributors of products with digital elements –... Read more »
Subscribe to our Newsletter