Please turn on your JavaScript for this page to function normally.
A flaw in ConnectWise Control spurred the company to make life harder for scammers

A vulnerability in popular remote access service/platform ConnectWise Control could have been leveraged by scammers to make compromising targets’ computers easier, …

Eyes
Fake subscription invoices lead to corporate data theft and extortion

A threat actor dubbed Luna Moth has been leveraging social engineering and legitimate software to steal sensitive data and extort money from small and medium-size businesses. …

lightbulb
Here’s how to make sure your incident response strategy is ready for holiday hackers

The best line of defense against holiday hacking schemes is a comprehensive incident response strategy that focuses on end-user vulnerabilities. The holiday season is upon us …

application
Threat actors extend attack techniques to new enterprise apps and services

Perception Point announced the publication of a report, “The Rise of Cyber Threats Against Email, Browsers and Emerging Cloud-Based Channels“, which evaluates the responses of …

money
Cyber risk focus areas for portfolio companies

IT management is a top concern, with many portfolio companies struggling with IT hygiene, potentially leaving them susceptible to costly breaches, according to a report from …

Microsoft 365
90% of organizations have Microsoft 365 security gaps

A recently published study evaluated 1.6 million Microsoft 365 users across three continents, finding that 90% of organizations had gaps in essential security protections. …

Cobalt Strike
Google seeks to make Cobalt Strike useless to attackers

Google Cloud’s intelligence research and applications team has created and released a collection of 165 YARA rules to help defenders flag Cobalt Strike components deployed by …

CISA free resources
5 free resources from the Cybersecurity and Infrastructure Security Agency (CISA)

The Cybersecurity and Infrastructure Security Agency (CISA) is an agency of the United States Department of Homeland Security. CISA is in charge of enhancing cybersecurity and …

Kubernetes
The pros and cons of using open-source Kubernetes security software

Open source tools are a key part of the Kubernetes security environment, with most companies using open source Kubernetes security software, research by ARMO has revealed. In …

week in review
Week in review: 5 Kali Linux tools, Spotify’s Backstage vulnerability, Cybertech NYC 2022

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: As trust in online spaces degrades, Canada bolsters resilience against cyber …

Cyber Marketing Con 2022
Photos: Cybersecurity marketers gather at Cyber Marketing Con 2022

Help Net Security is attending Cybersecurity Marketing Society’s Cyber Marketing Con 2022 in Arlington, VA. Here’s a look at the event. Nathan Burke, CMO, Axonius …

New infosec products of the week: November 18, 2022

Here’s a look at the most interesting products from the past week, featuring releases from Abnormal Security, Bearer, Clumio, Cohesity, ForgeRock, Keyo, LOKKER, and …

Don't miss

Cybersecurity news