"Cyber Grinches" Snatching Toys Should Be Stopped, Lawmakers Say
A group of Democrats wants to stop the Grinch from stealing Christmas. Except this time around the spoilsport they're targeting is not a furry green creature, but a robot. From a report: Lawmakers including Senators Richard Blumenthal and Chuck Schum.....»»
New infosec products of the week: October 4, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Balbix, Halcyon, Metomic, Red Sift, SAFE Security, Veeam Software, and Legit Security. SAFE X equips CISOs with integrated data from all their existing cyber.....»»
Best practices for implementing threat exposure management, reducing cyber risk exposure
In this Help Net Security interview, Sanaz Yashar, CEO at Zafran, discusses the role of threat exposure management (TEM) in modern cybersecurity strategies. As traditional vulnerability management evolves, TEM addresses the overwhelming risks arising.....»»
Veeam Recon Scanner identifies adversary tactics, techniques, and procedures
Veeam Software announced the addition of new Veeam Recon Scanner technology to Veeam Data Platform. This technology, developed by Coveware by Veeam, draws on years of experience in cyber-extortion incident response and the largest database of cyber i.....»»
Password management habits you should unlearn
Despite advancements in security technology, many individuals and organizations continue to rely on outdated and vulnerable authentication methods, leaving themselves exposed to cyber threats. This ongoing reliance on insecure methods has led to a st.....»»
Cybersecurity teams struggling to keep up with growing threat levels
Cybersecurity teams report struggling with the pressures and stress of increased cyber attacks.....»»
The most common authentication method is also the least secure
Despite the rise in cyber threats, many people do not have a holistic view of security, according to Yubico. The results of the survey uncovered concerning patterns and behaviors when it comes to personal and workplace cybersecurity, including the ex.....»»
Active Directory compromise: Cybersecurity agencies provide guidance
Active Directory (AD), Microsoft’s on-premises directory service for Windows domain networks, is so widely used for enterprise identity and access management that compromising it has become almost a standard step in cyber intrusions. “Act.....»»
Indicted NYC mayor to FBI: I, uh, forgot my phone’s passcode
I think it starts with a 2? Enlarge / NYC Mayor Eric Adams, in happier times, holding an AirTag. (credit: NYC Mayor's Office/YouTube) New York City mayor Eric Adams was stopped on the street by the FBI after an event in.....»»
Companies mentioned on the dark web at higher risk for cyber attacks
The presence of any data relating to an organization on the dark web demonstrably increases its risk of a cyber attack, according to Searchlight Cyber. Dark web insights and breach correlation Marsh McLennan Cyber Risk Intelligence Center analyzed th.....»»
Active Directory compromise: Cybersecurity agencies provde guidance
Active Directory (AD), Microsoft’s on-premises directory service for Windows domain networks, is so widely used for enterprise identity and access management that compromising it has become almost a standard step in cyber intrusions. “Act.....»»
Do you feel eco-guilt or eco-shame? Emotions reveal how much we care about the environment
Air travel, meat in the shopping cart, waste sorting, plastic toys—consumers are faced with a barrage of everyday decisions and priorities when navigating environmental concerns. But what drives these choices?.....»»
NetApp enhances security directly within enterprise storage
NetApp announced enhancements to its portfolio of cyber resiliency offerings to strengthen security for customers. NetApp is announcing the general availability of its NetApp ONTAP Autonomous Ransomware Protection with AI (ARP/AI) solution, with 99%.....»»
How to watch CrowdStrike face U.S. lawmakers for the first time on Tuesday
CrowdStrike's faulty software update caused a global IT outage in July. And now a company executive is about to face U.S. lawmakers for the first time......»»
How to watch CrowdStrike face U.S. lawmakers for first time on Tuesday
CrowdStrike's faulty software update caused a global IT outage in July. And now a company executive is about to face U.S. lawmakers for the first time......»»
How cyber compliance helps minimize the risk of ransomware infections
Over the past decade, ransomware has been cemented as one of the top cybersecurity threats. In 2023 alone, the FBI received 2,385 ransomware complaints, resulting in over $34 million in losses. To help businesses combat ransomware and other threats,.....»»
65% of websites are unprotected against simple bot attacks
Companies across industries are seeing more bot-driven attacks, both basic and advanced, according to DataDome. An analysis of over 14,000 websites uncovered alarming gaps in protection against cyber fraud, particularly within consumer-centric indust.....»»
Climate change is a pollution problem, and countries have stopped similar threats before—think DDT and acid rain
Climate change can seem like an insurmountable challenge. However, if you look closely at its causes, you'll realize that history is filled with similar health and environmental threats that humanity has overcome......»»
Organizations are changing cybersecurity providers in wake of Crowdstrike outage
More often than not, a cyber attack or a cyber incident that results in business disruption will spur organizations to make changes to improve their cybersecurity and cyber resilience – and sometimes that means changing cybersecurity providers......»»
The surge in cyber insurance and what it means for your business
The cyber insurance market is set for explosive growth as organizations increasingly seek financial protection against rising cyber threats. This surge in demand reflects a broader shift in how businesses approach risk management, viewing cyber insur.....»»
Offensive cyber operations are more than just attacks
In this Help Net Security interview, Christopher Jones, Chief Technology Officer and Chief Data Officer at Nightwing, talks about some key misconceptions and complexities surrounding offensive cyber operations. Many myths stem from a simplistic view.....»»