Advertisements


NetSTAR PhishCompass combats phishing threats

NetSTAR announced an advancement in phish detection technology with the introduction of PhishCompass. This innovative AI-supported solution marks a significant milestone in the ongoing battle against phishing threats and attacks, tailored for a wide.....»»

Category: securitySource:  netsecurityFeb 26th, 2024

A perfect storm: Assessing the deadly impact of climate-driven flooding and cyber attacks

Society is now in an era in which climate change and cyber insecurity are regular threats to life and property. In tandem, the two have the potential to be especially deadly......»»

Category: topSource:  physorgRelated NewsMar 20th, 2024

Red teaming in the AI era

As AI gets baked into enterprise tech stacks, AI applications are becoming prime targets for cyber attacks. In response, many cybersecurity teams are adapting existing cybersecurity practices to mitigate these new threats. One such practice measure i.....»»

Category: securitySource:  netsecurityRelated NewsMar 20th, 2024

Cybersecurity jobs available right now: March 19, 2024

Central Investigations & Cybersecurity Analyst Meta | USA | On-site – View job details The successful candidate will be able to assess and analyze large amounts of data to identify sources of potential threats and abuses, operate inde.....»»

Category: securitySource:  netsecurityRelated NewsMar 19th, 2024

The dark side of GenAI

Beyond traditional AI models, generative AI (GenAI) can create new content, images, and even entire scenarios from scratch. While this technology holds immense promise across various sectors, it also introduces challenges and threats to cybersecurity.....»»

Category: securitySource:  netsecurityRelated NewsMar 18th, 2024

AI and the future of corporate security

In this Help Net Security video, Tracy Reinhold, CSO at Everbridge, discusses why AI technology must be embraced while also exploring some guardrails that must be in place to protect organizations against threats using AI to penetrate facilities. The.....»»

Category: securitySource:  netsecurityRelated NewsMar 15th, 2024

Human risk factors remain outside of cybersecurity pros’ control

Cyber threats are growing at an unprecedented pace, and the year ahead is fraught with cybercrime and incidents anticipated ahead of the busy election year where over 50 countries head to the polls, according to Mimecast. With new threats like AI and.....»»

Category: securitySource:  netsecurityRelated NewsMar 15th, 2024

Halo Security Dark Web Monitoring identifies and mitigates potential exposures

Halo Security intoduced its new Dark Web Monitoring feature. This addition further enhances the company’s external security platform, allowing security teams to gain insights into potential threats originating from the dark web. With the new Da.....»»

Category: securitySource:  netsecurityRelated NewsMar 14th, 2024

QuProtect Core Security secures Cisco routers against quantum threats

QuSecure unveiled QuProtect Core Security, a product designed to fortify existing Cisco router-to-router communications against emerging quantum threats. Leveraging advanced crypto-agile post-quantum cryptography, QuProtect Core Security offers a sea.....»»

Category: securitySource:  netsecurityRelated NewsMar 14th, 2024

Cado Security enables organizations to investigate and respond to potential M365 threats

Cado Security announced that the Cado platform now enables customers to acquire Microsoft 365 Unified Audit Log (UAL) to help investigate and respond to Microsoft 365 compromises such as business email compromise (BEC), account takeover (ATO), and in.....»»

Category: securitySource:  netsecurityRelated NewsMar 14th, 2024

IT leaders think immutable data storage is an insurance policy against ransomware

IT leaders consider immutable storage as a must-have in the fight against cyberattacks, according to Scality. Ransomware threats are now understood by organizations to be inevitable. Reports show 1 in 4 organizations that pay a ransom never get their.....»»

Category: securitySource:  netsecurityRelated NewsMar 14th, 2024

Claroty Advanced ATD Module provides continuous monitoring of healthcare network risks

Claroty released Advanced Anomaly Threat Detection (ATD) Module within the Medigate Platform from Claroty. The new capability provides healthcare organizations with the clinical context to properly identify, assess, and prioritize threats to connecte.....»»

Category: securitySource:  netsecurityRelated NewsMar 12th, 2024

Thrive Incident Response & Remediation helps organizations contain and remove threats

Thrive launched Thrive Incident Response & Remediation, an on-demand cybersecurity response service to contain and remove threats, along with engineering assistance to rebuild and restore critical systems. Phishing, ransomware and other cyberattacks.....»»

Category: securitySource:  netsecurityRelated NewsMar 12th, 2024

Image-based phishing tactics evolve

While 70% of organizations feel their current security stacks are effective against image-based and QR code phishing attacks, 76% were still compromised in the last 12 months, according to IRONSCALES and Osterman Research. IT pros are highly aware of.....»»

Category: securitySource:  netsecurityRelated NewsMar 12th, 2024

Pioneering agricultural resilience and sustainability in the face of climate change

With climate change and growing global populations posing increasing threats to food security, the quest for agricultural sustainability and the resilience of crop yields becomes paramount. Current research strategies focus on genetic improvements to.....»»

Category: topSource:  physorgRelated NewsMar 11th, 2024

Insider threats can damage even the most secure organizations

Insider threats encompass both intentional and unintentional actions. Some insiders may maliciously exploit their access for personal gain, espionage, or sabotage, while others may inadvertently compromise security protocols due to negligence, lack o.....»»

Category: securitySource:  netsecurityRelated NewsMar 11th, 2024

Week in review: Attackers use phishing emails to steal NTLM hashes, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: What organizations need to know about the Digital Operational Resilience Act (DORA) In this Help Net Security interview, Kris Lovejoy, Global Securi.....»»

Category: securitySource:  netsecurityRelated NewsMar 10th, 2024

Leveraging AI and automation for enhanced cloud communication security

In this Help Net Security interview, Sanjay Macwan, CIO and CISO at Vonage, addresses emerging threats to cloud communications and the role of AI and automation in cybersecurity. What emerging threats to cloud communications are you most concerned ab.....»»

Category: securitySource:  netsecurityRelated NewsMar 8th, 2024

How new and old security threats keep persisting

Security leaders recognize that the pattern of buying new tech and the frantic state of find-fix vulnerability management is not working, according to Cymulate. Security leaders take proactive approach to cybersecurity Rather than waiting for the nex.....»»

Category: securitySource:  netsecurityRelated NewsMar 8th, 2024

Researchers create toolkit to support school safety

University of Virginia professors Dewey Cornell and Jennifer Maeng have created a toolkit that school districts may use to help keep schools safe from threats, including gun violence......»»

Category: topSource:  physorgRelated NewsMar 7th, 2024

78% of MSPs identify cybersecurity as prime IT challenge

Cybersecurity remained a top priority and an area of growth for MSPs, with 73% saying it’s a top revenue driver for their business, according to Kaseya. Ongoing cyberattack threats impact MSPs The threat of cyberattacks continues to weigh on MS.....»»

Category: securitySource:  netsecurityRelated NewsMar 7th, 2024