Campaign URL
Copy
Twitter
0
tweets
Subscribe
Past Issues
RSS
Translate
English
العربية
Afrikaans
беларуская мова
български
català
中文(简体)
中文(繁體)
Hrvatski
Česky
Dansk
eesti keel
Nederlands
Suomi
Français
Deutsch
Ελληνική
हिन्दी
Magyar
Gaeilge
Indonesia
íslenska
Italiano
日本語
ភាសាខ្មែរ
한국어
македонски јазик
بهاس ملايو
Malti
Norsk
Polski
Português
Português - Portugal
Română
Русский
Español
Kiswahili
Svenska
עברית
Lietuvių
latviešu
slovenčina
slovenščina
српски
தமிழ்
ภาษาไทย
Türkçe
Filipino
украї́нська
Tiếng Việt
Microsoft patches two actively exploited zero-days
April 15, 2024
View in your browser
.
Help Net Security weekly newsletter
Latest news:
Week in review: Palo Alto Networks firewalls under attack, Microsoft patches two exploited zero-days
CVE-2024-3400 exploited: Unit 42, Volexity share more details about the attacks
Palo Alto Networks firewalls under attack, hotfixes incoming! (CVE-2024-3400)
Strategies to cultivate collaboration between NetOps and SecOps
Why women struggle in the cybersecurity industry
New infosec products of the week: April 12, 2024
CISA warns about Sisense data breach
Ransomware group maturity should influence ransom payment decision
How Google’s 90-day TLS certificate validity proposal will affect enterprises
Leveraging AI for enhanced compliance and governance
Graylog: Open-source log management
37% of publicly shared files expose personal information
New covert SharePoint data exfiltration techniques revealed
IT pros targeted with malicious Google ads for PuTTY, FileZilla
Why are many businesses turning to third-party security partners?
WEF Cybercrime Atlas: Researchers are creating new insights to fight cybercrime
Cybersecurity jobs available right now: April 10, 2024
GSMA releases Mobile Threat Intelligence Framework
Microsoft patches two actively exploited zero-days (CVE-2024-29988, CVE-2024-26234)
LG smart TVs may be taken over by remote attackers
New Google Workspace feature prevents sensitive security changes if two admins don’t approve them
New Latrodectus loader steps in for Qbot
How exposure management elevates cyber resilience
EJBCA: Open-source public key infrastructure (PKI), certificate authority (CA)
Strategies for secure identity management in hybrid environments
XZ Utils backdoor: Detection tools, scripts, rules
92,000+ internet-facing D-Link NAS devices accessible via “backdoor” account (CVE-2024-3273)
April 2024 Patch Tuesday forecast: New and old from Microsoft
How can the energy sector bolster its resilience to ransomware attacks?
WiCyS: A champion for a more diverse cybersecurity workforce
Industrial sectors embrace zero trust for enhanced security
Videos:
The next wave of mobile threats
Stopping security breaches by managing AppSec posture
AI risks under the auditor’s lens more than ever
Defining a holistic GRC strategy
How malicious email campaigns continue to slip through the cracks
Threat actors are raising the bar for cyber attacks
Industry news:
Check Point boosts security in Harmony Email & Collaboration
Zscaler extends zero trust SASE and eliminates the need for firewall-based segmentation
Palo Alto Networks enhances Cortex XSIAM to help SecOps teams identify cloud threats
Ivanti empowers IT and security teams with new solutions and enhancements
AppViewX CERT+ helps organizations identify and renew certificates before they expire
Vultr Sovereign Cloud and Private Cloud delivers data control to nations and enterprises
Malwarebytes Digital Footprint Portal offers insights into exposed passwords and personal data
Index Engines CyberSense 8.6 detects malicious activity
Eclypsium Automata discovers vulnerabilities in IT infrastructure
Concentric AI unveils employee offboarding risk monitoring and reporting module
NICE Actimize enhances Integrated Fraud Management platform to help financial services prevent scams
Upcoming report on the state of cybersecurity in Croatia
ESET Small Business Security offers protection against online fraud, data theft and human error
Gurucul Data Optimizer provides control over real-time data transformation and routing
TufinMate accelerates network access troubleshooting
Rocket DevOps simplifies compliance processes
Akamai Shield NS53 protects on-prem and hybrid DNS infrastructure
Darktrace ActiveAI Security Platform helps organizations shift focus to proactive cyber resilience
SINEC Security Guard identifies vulnerable production assets
Bitdefender Digital Identity Protection enhancements guard against web data leaks
Veriato introduces AI-driven predictive behavior analytics platform
SymphonyAI unveils SensaAI for Sanctions to detect hidden risk in unstructured data
Copyright © 2024 Astus d.o.o. (Help Net Security), All rights reserved.
Want to change how you receive these emails?
You can
update your preferences
or
unsubscribe from this list