![Microsoft](https://img.helpnetsecurity.com/wp-content/uploads/2021/02/19130114/microsoft-hand-400x200.jpg)
Microsoft Authenticator suppresses suspicious MFA notifications
Microsoft has quietly rolled out a new mechanism that shields users of its mobile Authenticator app from suspicious (and annoying) push notifications triggered by attackers. …
![Sumo Logic](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/08123807/sumologic-08112023-400x200.jpg)
Sumo Logic discloses potential breach via compromised AWS credential
Cloud-native big data and security analytics firm Sumo Logic is investigating a potential security incident within their platform, the company revealed on Tuesday. The Sumo …
![Marina Bay Sands](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/08092156/marina_bay_sands_data_securitty_incident-400x200.jpg)
Marina Bay Sands breach exposed data of 665,000 customers
Singapore-based luxury resort and casino Marina Bay Sands has suffered a data breach that exposed data of 665,000 non-casino rewards program members. The Marina Bay Sands data …
![ransomware attack](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/24145026/ransomware-attack-400x200.jpg)
The 3 key stages of ransomware attacks and useful indicators of compromise
For SOC teams to be able to defend their organization against ransomware attacks, they need to have the right security toolset, but also an understanding of the three primary …
![Trivy](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/06152313/aqua-trivy-1400-400x200.jpg)
Aqua Trivy open-source security scanner now finds Kubernetes security risks
The Aqua Trivy open-source scanner now supports vulnerability scanning for Kubernetes components and Kubernetes Bill of Materials (KBOM) generation. Now, companies can better …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/24165921/brain-3d-2-400x200.png)
Companies have good reasons to be concerned about generative AI
Companies need help to get visibility into the operations of their AI programs, potentially reducing productivity while creating significant risks around governance, data …
![Microsoft Azure](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103137/microsoft-azure-400x200.jpg)
Uphold Linux systems’ performance and availability in Azure
Cloud computing carries many benefits for your business… as long as you can ensure the performance and availability of your cloud environments. Let’s take the following …
![Ultimate CISSP Guide](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/03084221/ultimate-guide-cissp-1400-400x200.jpg)
Download: The Ultimate Guide to the CISSP
The Ultimate Guide to the CISSP covers everything you need about the world’s premier cybersecurity leadership certification. Learn how CISSP and ISC2 will not only help you …
![](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/03124019/microsoft-soc-400x200.jpg)
Microsoft introduces new access policies in Entra to boost MFA usage
As part of a broader initiative to strengthen security, Microsoft is rolling out Microsoft-managed Conditional Access policies in Entra ID (formerly Azure Active Directory) to …
![Linux](https://img.helpnetsecurity.com/wp-content/uploads/2022/06/10122853/linux-red-danger-400x200.jpg)
Looney Tunables bug exploited for cryptojacking
Kinsing threat actors have been spotted exploiting the recently disclosed Looney Tunables (CVE-2023-4911) vulnerability to covertly install cryptomining software into …
![cyber threat maps](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/02091223/cyber_threat_maps-400x200.jpg)
7 free cyber threat maps showing attack intensity and frequency
Cyber threat maps are one of the most visually engaging tools in the arsenal of cybersecurity professionals. These real-time visualizations provide a global perspective on …
![Kubescape](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/27101027/kubescape2-400x200.jpg)
Kubescape 3.0 elevates open-source Kubernetes security
Targeted at the DevSecOps practitioner or platform engineer, Kubescape, the open-source Kubernetes security platform has reached version 3.0. Vulnerability scan results …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?