Please turn on your JavaScript for this page to function normally.
cybersecurity week in review
Week in review: CDK Global cyberattack, critical vCenter Server RCE fixed

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: The rise of SaaS security teams In this Help Net Security interview, Hillary …

Intel
Intel-powered computers affected by serious firmware flaw (CVE-2024-0762)

A vulnerability (CVE-2024-0762) in the Phoenix SecureCore UEFI, which runs on various Intel processors, could be exploited locally to escalate privileges and run arbitrary …

US bans Kaspersky antivirus software due to national security risks

The US Department of Commerce has announced an upcoming US-wide ban of cybersecurity and antivirus software by Kaspersky, as its “ability to gather valuable US business …

Cilium
Cilium: Open-source eBPF-based networking, security, observability

Cilium is an open-source, cloud-native solution that leverages eBPF technology in the Linux kernel to provide, secure, and monitor network connectivity between workloads. What …

USA
Pressure mounts on CISOs as SEC bares teeth with legal action

A Panaseer investigation into organizations’ annual 10-K filings reported to the SEC shows that from January-May 2024, at least 1,327 filings mentioned NIST – a key indicator …

Infosec products of the week
New infosec products of the week: June 21, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Atsign, Datadog, Metomic, NinjaOne, Verimatrix, and Veritas Technologies. Datadog …

Crown
Crown Equipment cyberattack confirmed, manufacturing disrupted for weeks

Ohio-based Crown Equipment, which is among the largest industrial and forklift truck manufacturers in the world, has become a victim of a cyberattack “by an …

CDK
CDK Global cyberattack cripples 15,000 US auto dealerships

CDK Global, a software-as-a-service (SaaS) provider for car dealers and auto equipment manufacturers, has suffered a cyberattack that has temporarily disrupted its …

Julianna Lamb
From passwords to passkeys: Enhancing security and user satisfaction

In this Help Net Security interview, Julianna Lamb, Stytch CTO, discusses the advantages of passwordless authentication. Eliminating passwords reduces data breaches and …

OT
Improving OT cybersecurity remains a work in progress

Organizations have made progress in the past 12 months related to advancing their OT security posture, but there are still critical areas for improvement as IT and OT network …

burnout
Most cybersecurity pros took time off due to mental health issues

Cybersecurity and infosecurity professionals say that work-related stress, fatigue, and burnout are making them less productive, including taking extended sick leave – costing …

eBook: CISO guide to password security
eBook: CISO guide to password security

Password security has seen dramatic shifts driven by the escalation of cyber threats and technological advancements. This eBook covers: Best practices for NIST-compliant …

Don't miss

Cybersecurity news