Advertisements


Cloudflare’s DLS in the Asia Pacific region helps customers comply with their data localization obligations

Cloudflare’s Data Localization Suite (DLS) is available in three new countries in the Asia Pacific region: Australia, India, and Japan. The Data Localization Suite will help businesses based in these countries, as well as global companies who do bu.....»»

Source:  NetsecurityCategory: SecuritySep 22nd, 2022Related News

Trellix launches Advanced Research Center to improve global threat intelligence

The Advanced Research Center, comprised of hundreds of the security analysts and researchers, produces actionable real-time intelligence and threat indicators to help customers detect, respond and remediate the latest cybersecurity threats. “The th.....»»

Source:  NetsecurityCategory: SecuritySep 22nd, 2022Related News

Tod Ewasko joins NetWitness as CPO

NetWitness announced Tod Ewasko as the new Chief Product Officer. “As NetWitness continues to push the boundaries of extended detection and response, and more organizations look to invest in threat detection, it is increasingly important that we gr.....»»

Source:  NetsecurityCategory: SecuritySep 22nd, 2022Related News

BioCatch hires Jonathan W. Daly as CMO

BioCatch announced that Jonathan W. Daly has joined the company as Chief Marketing Officer. With more than 25 years of executive marketing experience in high-growth technology companies, Jonathan W. Daly will be responsible for leading the developmen.....»»

Source:  NetsecurityCategory: SecuritySep 22nd, 2022Related News

Cloudflare integrates CASB and DLP services into its zero trust platform

Cloudflare has unveiled that both its Cloud Access Security Broker (CASB) and Data Loss Prevention (DLP) services are now available as part of Cloudflare’s zero trust platform. Cloudflare CASB provides businesses visibility and control across their.....»»

Source:  NetsecurityCategory: SecuritySep 22nd, 2022Related News

Commvault Metallic ThreatWise proactively detects unknown and zero-day threats

Commvault releases Metallic ThreatWise, an early warning system that proactively surfaces unknown and zero-day threats to minimize compromised data and business impact. According to Enterprise Strategy Group, only 12% of the IT directors surveyed ind.....»»

Source:  NetsecurityCategory: SecuritySep 22nd, 2022Related News

Onfido Motion protects against display attacks and sophisticated 2D/3D masks

Onfido unveiled Motion, a next generation biometric liveness solution to enhance its Real Identity Platform, launched in May. Motion delivers seamless, secure, and inclusive customer verification and is iBeta Level 2 certified. With a simple head-tur.....»»

Source:  NetsecurityCategory: SecuritySep 22nd, 2022Related News

SMBs vs. large enterprises: Not all compromises are created equal

Attackers view smaller organizations as having fewer security protocols in place, therefore requiring less effort to compromise. Lumu has found that compromise is significantly different for small businesses than for medium-sized and large enterprise.....»»

Source:  NetsecurityCategory: SecuritySep 22nd, 2022Related News

What could be the cause of growing API security incidents?

Noname Security announced the findings from its API security report, “The API Security Disconnect – API Security Trends in 2022”, which revealed a rapidly growing number of API security incidents, concerning lack of API visibility, and a level.....»»

Source:  NetsecurityCategory: SecuritySep 22nd, 2022Related News

The best ways to safeguard crypto assets

The mainstream emergence of cryptocurrency, coupled with its popularity among cybercriminals, has created a potentially dangerous environment for those with significant crypto holdings. In this Help Net Security video, Nick Percoco, Chief Security Of.....»»

Source:  NetsecurityCategory: SecuritySep 22nd, 2022Related News

Email-based threats: A pain point for organizations

In this Help Net Security video, Igal Lytzki, Incident Response Analyst at Perception Point, discusses a recent Remcos RAT malware campaign and more broadly, the threat that email-based threats and phishing pose to organizations. To extract credentia.....»»

Source:  NetsecurityCategory: SecuritySep 22nd, 2022Related News

What you need to know about Evil-Colon attacks

While novel attacks seem to emerge faster than TikTok trends, some warrant action before they’ve even had a chance to surface. This is the case for an attack we’ll refer to as Evil-Colon, which operates similarly to the now defunct Poison-NULL-By.....»»

Source:  NetsecurityCategory: SecuritySep 22nd, 2022Related News

Python tarfile vulnerability affects 350,000 open-source projects (CVE-2007-4559)

Trellix Advanced Research Center published its research into CVE-2007-4559, a vulnerability estimated to be present in over 350,000 open-source projects and prevalent in closed-source projects. Successful exploit The vulnerability exists in the Pytho.....»»

Source:  NetsecurityCategory: SecuritySep 22nd, 2022Related News

Wolfi: A Linux undistro with security measures for the software supply chain

Wolfi is a new community Linux undistribution that combines the best aspects of existing container base images with default security measures that will include software signatures powered by Sigstore, provenance, and software bills of material (SBOM).....»»

Source:  NetsecurityCategory: SecuritySep 22nd, 2022Related News

Revolut data breach: 50,000+ users affected

Revolut, the fintech company behing the popular banking app of the same name, has suffered a data breach, which has been followed by phishing attacks aimed at taking advantage of the situation. About the Revolut data breach Revolut customers began no.....»»

Source:  NetsecurityCategory: SecuritySep 20th, 2022Related News

Uber says Lapsus$ gang is behind the recent breach

Uber has confirmed that the recent breach of its systems started with a compromised account belonging to a contractor. “It is likely that the attacker purchased the contractor’s Uber corporate password on the dark web, after the contractor’.....»»

Source:  NetsecurityCategory: SecuritySep 20th, 2022Related News

How to activate Lockdown Mode on macOS Ventura

Apple announced additional security and privacy updates for its newest operating system. In this Help Net Security video, you’ll learn how to activate Lockdown Mode on your Mac in macOS Ventura. The post How to activate Lockdown Mode on macOS Ventu.....»»

Source:  NetsecurityCategory: SecuritySep 20th, 2022Related News

42Crunch API Scan helps enterprises to solve security challenges during the development workflows

42Crunch has released API Scan service inside the IDEs for developers. With over 500,000 developers already using 42Crunch, this latest addition to the platform means enterprises can further strengthen their shifting of API security as far left as po.....»»

Source:  NetsecurityCategory: SecuritySep 20th, 2022Related News

How can organizations benefit from full-stack observability?

New Relic published the 2022 Observability Forecast report, which captures insights into the current state of observability, its growth potential, and the benefits of achieving full-stack observability. As IT and application environments increasingly.....»»

Source:  NetsecurityCategory: SecuritySep 20th, 2022Related News

Open-source software usage slowing down for fear of vulnerabilities, exposures, or risks

Anaconda released its annual 2022 State of Data Science report, revealing the widespread trends, opportunities, and perceived blockers facing the data science, machine learning (ML), and artificial intelligence (AI) industries. The global study targe.....»»

Source:  NetsecurityCategory: SecuritySep 20th, 2022Related News