Campaign URL
Copy
Twitter
0
tweets
Subscribe
Past Issues
RSS
Translate
English
العربية
Afrikaans
беларуская мова
български
català
中文(简体)
中文(繁體)
Hrvatski
Česky
Dansk
eesti keel
Nederlands
Suomi
Français
Deutsch
Ελληνική
हिन्दी
Magyar
Gaeilge
Indonesia
íslenska
Italiano
日本語
ភាសាខ្មែរ
한국어
македонски јазик
بهاس ملايو
Malti
Norsk
Polski
Português
Português - Portugal
Română
Русский
Español
Kiswahili
Svenska
עברית
Lietuvių
latviešu
slovenčina
slovenščina
српски
தமிழ்
ภาษาไทย
Türkçe
Filipino
украї́нська
Tiếng Việt
Latest information security news and research from Help Net Security
Help Net Security weekly newsletter
View in your browser
.
This
collection
of free cybersecurity guides covers a broad range of topics, from resources for developing cybersecurity programs to specific guides for various sectors and organizations.
Latest news:
Product showcase: How to track SaaS security best practices with Nudge Security
Week in review: Cybersecurity job openings, hackers use 1-day flaws to drop custom Linux malware
Key MITRE ATT&CK techniques used by cyber attackers
90% of exposed secrets on GitHub remain active for at least five days
Human risk factors remain outside of cybersecurity pros’ control
New infosec products of the week: March 15, 2024
Critical FortiClient EMS vulnerability fixed, (fake?) PoC for sale (CVE-2023-48788)
PoC for critical Arcserve UDP vulnerabilities published (CVE-2024-0799, CVE-2024-0800)
MobSF: Open-source security research platform for mobile apps
Only 13% of medical devices support endpoint protection agents
IT leaders think immutable data storage is an insurance policy against ransomware
The effects of law enforcement takedowns on the ransomware landscape
LastPass’ CIO vision for driving business strategy, innovation
BSAM: Open-source methodology for Bluetooth security assessment
Keyloggers, spyware, and stealers dominate SMB malware detections
March 2024 Patch Tuesday: Microsoft fixes critical bugs in Windows Hyper-V
Hackers leverage 1-day vulnerabilities to deliver custom Linux malware
How advances in AI are impacting business cybersecurity
Cybersecurity jobs available right now: March 12, 2024
Tax-related scams escalate as filing deadline approaches
Image-based phishing tactics evolve
Microsoft: Russian hackers accessed internal systems, code repositories
10 free cybersecurity guides you might have missed
Transitioning to memory-safe languages: Challenges and considerations
CloudGrappler: Open-source tool detects activity in cloud environments
Advanced AI, analytics, and automation are vital to tackle tech stack complexity
Videos:
AI and the future of corporate security
How teams can improve incident recovery time to minimize damages
The most concerning risks for 2024 and beyond
How organizations can keep up with shifting data privacy regulations
Email security trends in the energy and infrastructure sector
Insider threats can damage even the most secure organizations
Industry news:
Perception Point GPThreat Hunter allows cybersecurity experts to focus on in-depth investigations
Cado Security enables organizations to investigate and respond to potential M365 threats
QuProtect Core Security secures Cisco routers against quantum threats
Halo Security Dark Web Monitoring identifies and mitigates potential exposures
Concentric AI introduces Copilot data risk module
Tenable enhances ExposureAI capabilities to directly query AI engine and reduce risk
DataDome Ad Protect detects fraudulent ad traffic
New Relic empowers IT and engineering teams to focus on real application security problems
Trellix secures sensitive and proprietary information with new protections for macOS
Regula 4205D updates help border control authorities fight identity document fraud
Mirantis enhances Lens Desktop to improve Kubernetes operations
Aviatrix releases Distributed Cloud Firewall for Kubernetes
Rubrik EPE secures enterprise data from cyberattacks
Claroty Advanced ATD Module provides continuous monitoring of healthcare network risks
Thrive Incident Response & Remediation helps organizations contain and remove threats
ZeroFox launches EASM to provide visibility and control over external assets
AuditBoard unveils AI, analytics, and annotation capabilities to deliver more timely insights
Cynerio extends Healthcare Cybersecurity Platform to improve patient data protections
Copyright © 2024 Astus d.o.o. (Help Net Security), All rights reserved.
Want to change how you receive these emails?
You can
update your preferences
or
unsubscribe from this list