Please turn on your JavaScript for this page to function normally.
face
Top 3 trends shaping the future of cybersecurity and IAM

The need to protect sensitive information from unauthorized access and theft has never been greater, and cybersecurity and IAM technologies are evolving to meet this challenge …

New infosec products of the week
New infosec products of the week: May 12, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Aqua Security, Feedzai, Nebulon, OpenVPN, Trua, and Zscaler. Aqua Security …

Eyes
Fraud victims risk more than money

Digital fraud has significant financial and psychological repercussions on victims, according to Telesign. Businesses may find a new reason to fear digital fraud as the …

analyst
CISOs’ confidence in post-pandemic security landscape fades

Most CISOs have returned to the elevated concerns they experienced early in the pandemic, according to Proofpoint. Elevated concerns among CISOs Globally, 68% of surveyed …

search
CISOs confront mounting obstacles in tracking cyber assets

Monitoring assets in ever-changing settings operating in both development and production stages presents challenges. In this Help Net Security video, Daniel Deeney, CEO at …

car
Automotive industry employees unaware of data security risks

30% of automotive employees don’t check security protocols before trying a new tool, according to Salesforce. This could put their company and customer data at risk. Alarming …

ransomware
Refined methodologies of ransomware attacks

Adversaries were able to encrypt data in 76% of the ransomware attacks that were conducted against surveyed organizations, according to Sophos. The survey also shows that when …

snake, threat
Turla’s Snake malware network disrupted by Five Eyes’ authorities

The US Justice Department announced the completion of court-authorized operation MEDUSA, to disrupt a global peer-to-peer network of computers compromised by sophisticated …

Kubernetes Bill of Materials (KBOM) Standard
Kubernetes Bill of Materials (KBOM) open-source tool enhances cloud security response to CVEs

Kubernetes Security Operations Center (KSOC) released the first-ever Kubernetes Bill of Materials (KBOM) standard. Available in an open-source CLI tool, this KBOM enables …

Tools
Prevent attackers from using legitimate tools against you

Malicious actors are increasingly exploiting legitimate tools to accomplish their goals, which include disabling security measures, lateral movement, and transferring files. …

Large Language Model
The security and privacy risks of large language models

A large language model (LLM) is an artificial intelligence (AI) algorithm that employs deep learning methodologies, and extensive data sets to comprehend, condense, create, …

malware
56,000+ cloud-based apps at risk of malware exfiltration

The technology sector had the highest number of malware-infected employees, most exposed corporate credentials and the majority of all stolen cookies, according to SpyCloud. …

Don't miss

Cybersecurity news