Advertisements


CISA: Use Signal or other secure communications app

In the wake of the widespread compromise of US telecom giants’ networks by Chinese hackers and the FBI advising Americans to use end-to-end encrypted communications, CISA is advising “highly targeted individuals” – senior gove.....»»

Source:  NetsecurityCategory: Security22 hr. 33 min. ago Related News

Another NetWalker affiliate sentenced to 20 years in prison

A 30-year old Romanian man was sentenced to 20 years in prison for leveraging the Netwalker ransomware to extort money from victims, the US Department of Justice announced on Thursday. Daniel Christian Hulea, of Jucu de Mijloc, Cluj, Romania, was arr.....»»

Source:  NetsecurityCategory: SecurityDec 20th, 2024Related News

New infosec products of the week: December 20, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Appdome, GitGuardian, RunSafe Security, Stairwell, and Netwrix. GitGuardian launches multi-vault integration to combat secrets sprawl GitGuardian unveiled a.....»»

Source:  NetsecurityCategory: SecurityDec 20th, 2024Related News

46% of financial institutions had a data breach in the past 24 months

As the financial industry is the most targeted sector for data breaches in 2024, it’s now more important than ever to strengthen the industry moving into 2025, according to SailPoint. Financial institutions face growing cyber threats In 2024, rough.....»»

Source:  NetsecurityCategory: SecurityDec 20th, 2024Related News

AI is becoming the weapon of choice for cybercriminals

AI changes how organizations look at cybersecurity GenAI is compromising security while promising efficiency This article highlights key findings from 2024 reports on AI and GenAI technologies, focusing on their potential and major challenges. Overre.....»»

Source:  NetsecurityCategory: SecurityDec 20th, 2024Related News

Why cybersecurity is critical to energy modernization

In this Help Net Security interview, Anjos Nijk, Managing Director of the European Network for Cyber security (ENCS), discusses cybersecurity in the energy sector as it modernizes with renewable sources and smart grid technologies. Nijk also addresse.....»»

Source:  NetsecurityCategory: SecurityDec 20th, 2024Related News

Legit Security provides insights into the enterprise’s secrets posture

Legit Security announced enhancements to its secrets scanning product. Available as either a stand-alone product or as part of a broader ASPM platform, Legit released a new secrets dashboard for an integrated view of all findings and recovery actions.....»»

Source:  NetsecurityCategory: SecurityDec 19th, 2024Related News

CISA orders federal agencies to secure their Microsoft cloud environments

The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a binding operational directive (BOD 25-01) requiring federal civilian agencies to secure their (Microsoft) cloud environments. About the CISA BOD 25-01 directive The Implement.....»»

Source:  NetsecurityCategory: SecurityDec 19th, 2024Related News

NETSCOUT uses AI/ML technology to secure critical IT infrastructure

NETSCOUT updates its Arbor Edge Defense (AED) and Arbor Enterprise Manager (AEM) products as part of its Adaptive DDoS Protection Solution to combat AI-enabled DDoS threats and protect critical IT infrastructure. DDoS threats and protect critical IT.....»»

Source:  NetsecurityCategory: SecurityDec 19th, 2024Related News

Cryptocurrency hackers stole $2.2 billion from platforms in 2024

$2.2 billion worth of cryptocurrency was stolen from various platforms in 2024, Chainalysis’ 2025 Crypto Crime Report has revealed. Of that sum, $1.34 billion was stolen by North Korea-affiliated hackers, across 47 hacking incidents (out of 303.....»»

Source:  NetsecurityCategory: SecurityDec 19th, 2024Related News

Ransomware in 2024: New players, bigger payouts, and smarter tactics

In 2024, ransomware remained the top cybersecurity threat to organizations worldwide. New groups filled the void left by law enforcement crackdowns, targeting businesses with record-breaking ransom demands and sophisticated tactics. In this article,.....»»

Source:  NetsecurityCategory: SecurityDec 19th, 2024Related News

Leadership skills for managing cybersecurity during digital transformation

In this Help Net Security interview, Dan Lohrmann, CISO at Presidio, discusses the need for organizations to rethink their leadership and operational strategies and the cybersecurity risks they have to deal with during digital transformation. The pos.....»»

Source:  NetsecurityCategory: SecurityDec 19th, 2024Related News

Are threat feeds masking your biggest security blind spot?

Security teams that subscribe to threat feeds get lists of known malicious domains, IPs, and file signatures that they can leverage to blacklist and prevent attacks from those sources. The post Are threat feeds masking your biggest security blind spo.....»»

Source:  NetsecurityCategory: SecurityDec 19th, 2024Related News

Enpass simplifies compliance and security controls for password management

Enpass added Single Sign-On (SSO) for its admin console in support for its Business Enterprise customers. Enpass integrates seamlessly with prominent Identity Providers (IDPs) such as Google Workspace, Okta, and Microsoft Entra ID, further enhancing.....»»

Source:  NetsecurityCategory: SecurityDec 19th, 2024Related News

Ataccama ONE platform enhancements accelerate enterprise data quality initiatives

Ataccama announced enhancements to the Ataccama ONE unified data trust platform v15.4 that enable customers to have confidence in using their data for business-critical decision-making. In this latest release, enhancements include augmenting its AI c.....»»

Source:  NetsecurityCategory: SecurityDec 19th, 2024Related News

NetSPI introduces external attack surface management solutions

NetSPI introduced three tiers of external attack surface management (EASM) solutions, delivered through the The NetSPI Platform. The new offerings address the evolving needs of NetSPI’s global customer base, to move toward a continuous threat e.....»»

Source:  NetsecurityCategory: SecurityDec 19th, 2024Related News

Netwrix 1Secure enhances protection against data and identity access risks

Netwrix released a new version of its SaaS platform, Netwrix 1Secure. The latest version builds on its existing security monitoring functionality with more robust access rights assessment and expanded security auditing capabilities to overcome the la.....»»

Source:  NetsecurityCategory: SecurityDec 19th, 2024Related News

Ukrainian hacker gets prison for infostealer operations

Ukrainian national Mark Sokolovsky was sentenced to 60 months in federal prison for one count of conspiracy to commit computer intrusion. According to court documents, he conspired to operate the Raccoon Infostealer as a malware-as-a-service (MaaS)......»»

Source:  NetsecurityCategory: SecurityDec 19th, 2024Related News

European companies hit with effective DocuSign-themed phishing emails

A threat actor looking to take over the Microsoft Azure cloud infrastructure of European companies has successfully compromised accounts of multiple victims in different firms, according to Palo Alto Networks’ Unit 42 researchers. The phishing.....»»

Source:  NetsecurityCategory: SecurityDec 18th, 2024Related News

Stairwell Core boosts threat intelligence for security teams

Stairwell announces Stairwell Core, which enables organizations to privately collect, store, and continuously reassess executable files so they can confidently determine if malware has affected their systems. Core offers customers an accessible entry.....»»

Source:  NetsecurityCategory: SecurityDec 18th, 2024Related News