Exabeam and Wiz join forces to improve cloud security

Exabeam coolaborates with with Wiz to provide organizations with improved threat detection, investigation, and response (TDIR) capabilities, ensuring a more secure and resilient cloud environment. With its open architecture... Read more »

Arkose Device ID detects suspicious activity patterns

Arkose Labs launched Arkose Device ID, a device identification solution that raises the bar in fraud detection by combining precise device tracking with session-based risk signals and anti-spoofing technology.... Read more »

Yubico Enrollment Suite boosts security for Microsoft users

Yubico announced Yubico Enrollment Suite for Microsoft users, including Yubico FIDO Pre-reg and the new YubiEnroll. These solutions integrate with Microsoft’s Entra ID, helping organizations create stronger cyber resilience... Read more »

Unsecured JupyterLab and Jupyter Notebooks servers abused for illegal streaming of Sports events

Threat actors exploit misconfigured JupyterLab and Jupyter Notebooks servers to rip sports streams and illegally redistribute them. Researchers from security firm Aqua observed threat actors exploiting misconfigured JupyterLab and... Read more »

Microsoft Ignite: A $4m zero-day reward plus $349 thin client

Read more »

Five backup lessons learned from the UnitedHealth ransomware attack

The ransomware attack on UnitedHealth earlier this year is quickly becoming the healthcare industry’s version of Colonial Pipeline, prompting congressional testimony, lawmaker scrutiny and potential legislation.  Over the past few... Read more »

Debunking myths about open-source security

In this Help Net Security interview, Stephanie Domas, CISO at Canonical, discusses common misconceptions about open-source security and how the community can work to dispel them. She explains how... Read more »

Safeguarding the DNS through registries

The integrity of our online ecosystem heavily relies on domain registries, which serve as the foundation for secure and trusted digital experiences. However, threats like Domain Name System (DNS)... Read more »

Cybersecurity jobs available right now: November 20, 2024

Application Security Engineer ENOC | UAE | On-site – View job details As an Application Security Engineer, you will establish and maintain DLP policies to prevent unauthorized access, transmission,... Read more »

Overreliance on GenAI to develop software compromises security

GenAI is quickly changing the software development process by automating tasks that once took developers hours, if not days, to complete, bolstering efficiency and productivity, according to Legit Security.... Read more »
Subscribe to our Newsletter