Advertisements


Week in review: RADIUS protocol critical vuln, Microsoft 0-day exploited for a year, AT&T breach

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Hackers stole call, text records of “nearly all” of AT&T’s cellular customers Hackers leveraging stolen Snowflake account credentials have sto.....»»

Source:  NetsecurityCategory: Security11 hr. 50 min. ago Related News

Forcepoint promotes Ryan Windham to CEO

Forcepoint announced the promotion of Ryan Windham, Chief Customer and Strategy Officer, to Chief Executive Officer (CEO), succeeding Manny Rivelo, who is retiring from his position as CEO of the company. These transitions will be effective immediate.....»»

Source:  NetsecurityCategory: SecurityJul 12th, 2024Related News

Gathid identity governance platform enhancements help identify access changes

Gathid announced the release of Version 1.14.0 of its identity governance platform. This latest update introduces new comprehensive export capabilities that enable users to seamlessly establish an identity baseline in minutes with a complete view of.....»»

Source:  NetsecurityCategory: SecurityJul 12th, 2024Related News

Info of 2,3+ million individuals stolen in Advance Auto Parts data breach

Personal information of over 2,3 million individuals has been stolen by attackers as part of the massive data grab via compromised Snowflake accounts without MFA protection, Advance Auto Parts has confirmed by filing notices with the attorney general.....»»

Source:  NetsecurityCategory: SecurityJul 12th, 2024Related News

Hackers stole call, text records of “nearly all” of AT&T’s cellular customers

Hackers leveraging stolen Snowflake account credentials have stolen records of calls and texts made by “nearly all” of AT&T’s cellular customers from May to October 2022, the company has confirmed. “The data does not contain the c.....»»

Source:  NetsecurityCategory: SecurityJul 12th, 2024Related News

How to design a third-party risk management framework

Most organizations focus on securing routers, servers, firewalls, and other endpoints, but threats can also arise from unfamiliar sources such as third-party networks, which can be used by hackers to attack an organization. Through a strong TPRM fram.....»»

Source:  NetsecurityCategory: SecurityJul 12th, 2024Related News

New infosec products of the week: July 12, 2024

Here’s a look at the most interesting products from the past week, featuring releases from AttackIQ, IT-Harvest, Pentera, Prompt Security, and Quantum Xchange. AttackIQ Mission Control simplifies security testing for distributed teams AttackIQ Miss.....»»

Source:  NetsecurityCategory: SecurityJul 12th, 2024Related News

Top priorities for compliance leaders this year

Legal, compliance and privacy leaders list strengthening their personal impact on company strategy as their top priority for 2024, according to Gartner. Improving third party risk management (TPRM), and ensuring compliance programs can keep pace with.....»»

Source:  NetsecurityCategory: SecurityJul 12th, 2024Related News

Managing cyberattack fallout: Financial and operational damage

In this Help Net Security, Ashley Harrington, Director of Cybersecurity at Aspida, discusses the impact of cyberattack on business operations and financial health. Beyond immediate disruptions and financial burdens, cyber incident can severely damage.....»»

Source:  NetsecurityCategory: SecurityJul 12th, 2024Related News

Kanguru’s hardware-based internal SEDs secure data on laptops, tablets, and computers

Kanguru has unveiled its latest security product line aimed at helping organizations safeguard sensitive data on laptops, tablets, and computers. The new hardware-based internal Self-Encrypting Drives (SEDs) are high-performance solid state drives de.....»»

Source:  NetsecurityCategory: SecurityJul 11th, 2024Related News

ScienceLogic enhances AIOps platform to improve security and third-party industry interoperability

ScienceLogic announced a series of key updates to its AIOps platform to deliver enhanced reliability and security, enterprise enablement, third-party integration, improved user experience, and greater support for data center needs. The updates includ.....»»

Source:  NetsecurityCategory: SecurityJul 11th, 2024Related News

Using Authy? Beware of impending phishing attempts

Do you use Authy for your multi-factor authentication needs? If you do, you should keep an eye out for phishing attempts, as well as implement defenses against SIM swapping attacks. What happened? On July 1, Twilio – the company that develops t.....»»

Source:  NetsecurityCategory: SecurityJul 11th, 2024Related News

Prompt Security introduces GenAI security solution for MSSPs

Prompt Security announced its product and go-to-market support for Managed Security Service Providers (MSSPs). This strategic initiative has already resulted in partnerships with MSSPs across Europe, the Middle East, North America, and the Asia-Pacif.....»»

Source:  NetsecurityCategory: SecurityJul 11th, 2024Related News

Travel scams exposed: How to recognize and avoid them

In this Help Net Security video, Aaron Walton, Threat Intel Analyst at Expel, discusses travel scams. For the past 18 months, the Expel SOC team has observed a campaign targeting administrative credentials for Booking.com. The attackers create phishi.....»»

Source:  NetsecurityCategory: SecurityJul 11th, 2024Related News

Strengthening cybersecurity preparedness with defense in depth

In this Help Net Security interview, Chaim Mazal, Chief Security Officer at Gigamon, discusses cybersecurity preparedness measures for businesses, the impact of international inconsistencies on global operations, and the board’s role in cyberse.....»»

Source:  NetsecurityCategory: SecurityJul 11th, 2024Related News

How AI helps decode cybercriminal strategies

With terms like “AI washing” making their way into mainstream business consciousness, the hype surrounding AI is making it harder to differentiate between the true applications and empty promises of the technology. The quest for tangible business.....»»

Source:  NetsecurityCategory: SecurityJul 11th, 2024Related News

Valuable insights for making the right cybersecurity decisions

This article compiles excerpts from various reports, presenting statistics and insights that could be helpful for CISOs. CISOs becoming more comfortable with risk levels Netskope | The Modern CISO: Bringing Balance | June 2024 Contradicting.....»»

Source:  NetsecurityCategory: SecurityJul 11th, 2024Related News

Enzoic Global Partner Program helps combat dark web exposures

Enzoic has unveiled its Enzoic Global Partner Program to help organizations strengthen their security posture in response to the evolving cybersecurity landscape. Participants have access to Enzoic’s award-winning threat intelligence solutions whic.....»»

Source:  NetsecurityCategory: SecurityJul 10th, 2024Related News

Command Zero emerges from stealth with $21 million in seed funding

Command Zero emerged from stealth with $21 million in seed funding, led by Andreessen Horowitz with participation from Insight Partners and over 60 cyber industry thought leaders and executives. Using encoded expert knowledge, automation and advanced.....»»

Source:  NetsecurityCategory: SecurityJul 10th, 2024Related News

Mirantis OpenStack for Kubernetes 24.2 automates workload distribution

Mirantis announced Mirantis OpenStack for Kubernetes (MOSK) 24.2 with an exclusive dynamic resource balancer feature that automates workload distribution to solve hotspot and “noisy neighbor” problems. Now, MOSK automatically redistributes worklo.....»»

Source:  NetsecurityCategory: SecurityJul 10th, 2024Related News