Campaign URL
Copy
Twitter
0
tweets
Subscribe
Past Issues
RSS
Translate
English
العربية
Afrikaans
беларуская мова
български
català
中文(简体)
中文(繁體)
Hrvatski
Česky
Dansk
eesti keel
Nederlands
Suomi
Français
Deutsch
Ελληνική
हिन्दी
Magyar
Gaeilge
Indonesia
íslenska
Italiano
日本語
ភាសាខ្មែរ
한국어
македонски јазик
بهاس ملايو
Malti
Norsk
Polski
Português
Português - Portugal
Română
Русский
Español
Kiswahili
Svenska
עברית
Lietuvių
latviešu
slovenčina
slovenščina
српски
தமிழ்
ภาษาไทย
Türkçe
Filipino
украї́нська
Tiếng Việt
Latest information security news and research from Help Net Security
Help Net Security weekly newsletter
View in your browser
.
Get a full inventory of all SaaS accounts ever created by anyone in your org in minutes with Nudge Security. And, use built-in workflows to automate tedious tasks like user access reviews, IT offboarding and more.
Start now
.
Latest news:
What makes ransomware victims less likely to pay up?
New infosec products of the week: January 26, 2024
Emerging trends and strategies in digital forensics
Russian hackers breached Microsoft, HPE corporate maliboxes
AI expected to increase volume, impact of cyberattacks
Fighting insider threats is tricky but essential work
Automated Emulation: Open-source breach and attack simulation lab
CISOs’ role in identifying tech components and managing supply chains
PoC for easily exploitable Fortra GoAnywhere MFT vulnerability released (CVE-2024-0204)
The effect of omission bias on vulnerability management
10 USA cybersecurity conferences you should visit in 2024
Prioritizing CIS Controls for effective cybersecurity across organizations
Whitepaper: MFA misconceptions
Apple debuts new feature to frustrate iPhone thieves
Apple fixes actively exploited WebKit zero-day (CVE-2024-23222)
Data of 15 million Trello users scraped and offered for sale
Why cyberattacks mustn’t be kept secret
Beyond blockchain: Strategies for seamless digital asset integration
Attackers can steal NTLM password hashes via calendar invites
Tietoevry ransomware attack halts Swedish organizations
New method to safeguard against mobile account takeovers
Without clear guidance, SEC’s new rule on incident reporting may be detrimental
The reality of hacking threats in connected car systems
CloudFoxable: Open-source AWS penetration testing playground
Videos:
In 2024, AI and ML shift from flashy to functional
Why resilience leaders must prepare for polycrises
Top cybersecurity concerns for the upcoming elections
Industry news:
Searchlight Cyber adds AI-powered language translation to simplify dark web investigations
Vercara introduces the Private Data Lake feature into UltraDNS
Guardian Air boosts Nozomi Networks threat detection, securing from endpoint to air
Regula introduces smart testing for remote onboarding efficiency
Protect AI Guardian scans ML models to determine if they contain unsafe code
1Kosmos BlockID 1Key secures users in restricted environments
Venafi Stop Unauthorized Code Solution reduces attack surface
Stack Identity expands its platform with ITDR to tackle shadow access and shadow identities
Tufin Dashboard Essentials tracks security implementation progress
Cato Networks introduces new incident response tools
Seceon aiSIEM-CGuard protects cloud-powered applications and infrastructure
Veriti Odin utilizes AI algorithms to detect and analyze threats
Zscaler unveils Zero Trust SASE solution for simplified security implementation
Atakama Browser Security Platform improves security for MSPs
Onfido Compliance Suite simplifies local and global identity verification
Netskope introduces SASE solution for midmarket enterprises
Copyright © 2024 Astus d.o.o. (Help Net Security), All rights reserved.
Want to change how you receive these emails?
You can
update your preferences
or
unsubscribe from this list