Campaign URL
Copy
Twitter
0
tweets
Subscribe
Past Issues
RSS
Translate
English
العربية
Afrikaans
беларуская мова
български
català
中文(简体)
中文(繁體)
Hrvatski
Česky
Dansk
eesti keel
Nederlands
Suomi
Français
Deutsch
Ελληνική
हिन्दी
Magyar
Gaeilge
Indonesia
íslenska
Italiano
日本語
ភាសាខ្មែរ
한국어
македонски јазик
بهاس ملايو
Malti
Norsk
Polski
Português
Português - Portugal
Română
Русский
Español
Kiswahili
Svenska
עברית
Lietuvių
latviešu
slovenčina
slovenščina
српски
தமிழ்
ภาษาไทย
Türkçe
Filipino
украї́нська
Tiếng Việt
Latest information security news and research from Help Net Security
Help Net Security weekly newsletter
View in your browser
.
Build a Sustainable GRC Program with CIS SecureSuite
Tired of lagging behind compliance-related costs? A governance, risk, and compliance (GRC) program powered by CIS SecureSuite can help you keep up. Through 4/1, save up to 20% on a new SecureSuite Membership with promo code GRC2024.
Join Today
!
Latest news:
A cybercriminal is sentenced, will it make a difference?
Week in review: Attackers use phishing emails to steal NTLM hashes, Patch Tuesday forecast
Cisco patches Secure Client VPN flaw that could reveal authentication tokens (CVE-2024-20337)
March 2024 Patch Tuesday forecast: A popular framework updated
Immediate AI risks and tomorrow’s dangers
How new and old security threats keep persisting
Leveraging AI and automation for enhanced cloud communication security
OpenARIA: Open-source edition of the Aviation Risk Identification and Assessment (ARIA)
New infosec products of the week: March 8, 2024
VMware patches critical flaws in ESXi, Workstation, Fusion and Cloud Foundation
Web-based PLC malware: A new potential threat to critical infrastructure
Today’s biggest AI security challenges
Tazama: Open-source real-time fraud management
78% of MSPs identify cybersecurity as prime IT challenge
Apple fixes two actively exploited iOS zero-days (CVE-2024-23225, CVE-2024-23296)
5 ways to keep API integrations secure
RiskInDroid: Open-source risk analysis of Android apps
How to create an efficient governance control program
AI tools put companies at risk of data exfiltration
Hundreds of orgs targeted with emails aimed at stealing NTLM authentication hashes
Why cyber maturity assessment should become standard practice
3 free data protection regulation courses you can take right now
What organizations need to know about the Digital Operational Resilience Act (DORA)
Organizations are knowingly releasing vulnerable applications
Critical vulnerabilities in TeamCity JetBrains fixed, release of technical details imminent, patch quickly! (CVE-2024-27198, CVE-2024-27199)
GitHub push protection now on by default for public repositories
Phishers target FCC, crypto holders via fake Okta SSO pages
Securing software repositories leads to better OSS security
PyRIT: Open-source framework to find risks in generative AI systems
95% believe LLMs making phishing detection more challenging
New compensation trends in the cybersecurity sector
Photos: BSidesZagreb 2024
Videos:
Securing the future: Addressing cybersecurity challenges in the education sector
Major shifts in identity, ransomware, and critical infrastructure threat trends
Navigating regulation challenges for protecting sensitive healthcare data
Secure your hybrid workforce: The advantages of encrypted storage
Integrating software supply chain security in DevSecOps CI/CD pipelines
Enhancing security through proactive patch management
Industry news:
Identiv releases bitse.io 3.0, simplifying the deployment of IoT applications
Bitdefender GravityZone CSPM+ automates the discovery of cloud misconfigurations
FileCloud expands data governance and compliance tools
Veeam and Microsoft develop AI solutions aimed at improving data protection
Regula updates Document Reader SDK to reduce the risk of identity theft
Skybox 13.2 empowers organizations to identify and remediate vulnerabilities
Paramount Defenses launches Gold Finger 8.0 for Microsoft Active Directory
IONIX Exposure Validation identifies and prioritizes exploitable vulnerabilities
Check Point introduces Harmony SaaS for automated threat prevention
Cloudflare Magic Cloud Networking simplifies security and management of public clouds
Lookout introduces SSE solution for mid-market enterprises
Metomic provides data security tool for organizations that rely on Slack
Deepwatch increases flexibility with its open security data architecture
Pentera Cloud empowers security teams to reduce exposure to cloud-native attacks
Appian Platform enhancements unify generative AI and process automation
Pathlock CAC helps SAP customers comply with regulations
Sentra Jagger provides real-time security insights and AI-assisted remediation guidelines
Cloudflare announces Firewall for AI to help security teams secure their LLM applications
Bitdefender releases GravityZone Cloud MSP Security Solutions
Delinea Privilege Control for Servers enforces least privilege principles on critical systems
NetApp cyber-resiliency capabilities protect both primary and secondary data
Okta FGA enables developers to define authorization in a way that best fits their business
Cloudflare Defensive AI protects organizations against AI-enhanced attacks
Cyolo PRO simplifies remote privileged access in OT environments
Identiv ScrambleFactor provides privacy and security in restricted access environments
Akamai App & API Protector enhancements detect and mitigate short DDoS attack bursts
Zyxel Networks introduces affordable WiFi 7 solution for SMBs
Silobreaker enhances threat intelligence platform with MITRE ATT&CK TTP detection capabilities
Copyright © 2024 Astus d.o.o. (Help Net Security), All rights reserved.
Want to change how you receive these emails?
You can
update your preferences
or
unsubscribe from this list