Security News > 2024 > April

6 Best Open Source Password Managers for Windows in 2024
2024-04-09 10:29

While closed-source password managers don't publicly share their codes for users to modify, open-source password managers do share their codes with a community of users to revise or update over time. Top open-source password managers for Windows comparison table.

TechRepublic Academy Is Offering Extra 20% Off Most Deals Through April 16
2024-04-09 08:42

Site-wide sales are not an everyday thing, so it would be a shame to miss this opportunity to grab your favorite deals at TechRepublic Academy with an extra 20% discount on the already lowered prices. From April 8th through 11:59 PM Pacific Time on April 16th, TechRepublic Academy is having site-wide sales by offering a 20% additional discount on most deals.

Attackers Using Obfuscation Tools to Deliver Multi-Stage Malware via Invoice Phishing
2024-04-09 07:24

Cybersecurity researchers have discovered an intricate multi-stage attack that leverages invoice-themed phishing decoys to deliver a wide range of malware such as Venom RAT, Remcos RAT, XWorm,...

Critical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks
2024-04-09 05:46

Threat actors are actively scanning and exploiting a pair of security flaws that are said to affect as many as 92,000 internet-exposed D-Link network-attached storage (NAS) devices. Tracked...

Embracing the Cloud: Revolutionizing Privileged Access Management with One Identity Cloud PAM Essentials
2024-04-09 05:30

As cyber threats loom around every corner and privileged accounts become prime targets, the significance of implementing a robust Privileged Access Management (PAM) solution can't be overstated....

How exposure management elevates cyber resilience
2024-04-09 04:43

Understanding an attacker's viewpoint is crucial for pinpointing vulnerabilities, informing security teams where to apply security measures first and what additional security controls are necessary. Without seeing how an attacker can infiltrate the organization, securing an organization becomes a hypothetical task.

EJBCA: Open-source public key infrastructure (PKI), certificate authority (CA)
2024-04-09 04:30

It can handle almost anything, and someone once called it the kitchen sink of PKI. With its extensive history as one of the longest-standing CA software projects, EJBCA offers proven robustness, reliability, and adaptability. "EJBCA was created as an open-source project. The first version of the software was released as open source in December 2001. The ability to make a living from working with it and form a good company with many developers working on open source came later when the co-founders of PrimeKey and I realized that it was something we could do," Tomas Gustavsson, the creator of EJBCA, told Help Net Security.

Strategies for secure identity management in hybrid environments
2024-04-09 04:00

In this Help Net Security interview, Charlotte Wylie, SVP and Deputy CSO at Okta, discusses the challenges of managing user identities across hybrid IT environments. Wylie also highlights strategies for combating password fatigue, integrating IAM solutions, securing operational technology, and establishing identity security policies.

Defining a holistic GRC strategy
2024-04-09 03:30

End-user spending on security and risk management will total $215 billion in 2024, according to Gartner. In this Help Net Security video, Nicholas Kathmann, CISO at LogicGate, discusses why companies are turning to a holistic GRC strategy.

Targus discloses cyberattack after hackers detected on file servers
2024-04-09 01:41

Laptop and tablet accessories maker Targus disclosed that it suffered a cyberattack disrupting operations after a threat actor gained access to the company's file servers. Targus is a mobile accessories company known for stylish laptop bags and carrying cases.