Security News > 2024 > May

The authors behind the resurfaced ZLoader malware have added a feature that was originally present in the Zeus banking trojan that it's based on, indicating that it's being actively developed....

A former employee of the U.S. National Security Agency (NSA) has been sentenced to nearly 22 years (262 months) in prison for attempting to transfer classified documents to Russia. "This sentence...

Patch network security isn't applicable in the same way for cloud environments, and few cloud providers assign Common Vulnerabilities and Exposures identifiers to vulnerabilities. For vulnerability management teams who talk exclusively in this CVE-based construct, the lack of CVEs in cloud services is a significant challenge.

Although more women are entering the field of cyber security today, they still face challenges in obtaining senior positions, highlighting the need to break the glass ceiling. This could discourage women from pursuing a career in cyber security, and change is unlikely until more women hold influential senior positions.

As a Cyber Security Analyst, you will monitor and analyze security events and alerts, perform triage of incoming alerts - assess the priority, determine risk, and respond, create tickets and escalate them to higher-level security analysts and developers. As the Expert, IT Security, you will ensure the availability of up-to-date expert knowledge on risk and security tools, procedures, and systems while driving enhancements to our IT security architecture.

In this Help Net Security video, David Kellerman, Field CTO at Cymulate, discusses how cloud security still seems to lag even as the cloud grows in popularity and usage. Many leaders are unaware that they need to secure the cloud the same way they would on-prem infrastructure and that the responsibility falls to them, not cloud providers, to do the work.

A fourth quarter 2023 Gartner survey of 303 security leaders whose organizations had already implemented or are planning to implement a zero-trust strategy found that 56% of organizations are primarily pursuing a zero-trust strategy because it's cited as an industry best practice. "For most organizations, a zero-trust strategy typically addresses half or less of an organization's environment and mitigates one-quarter or less of overall enterprise risk."

CyberSense 8.6 ushers in a more proactive approach to ensuring data integrity against insider threats and external bad actors with a variety of customizable data threshold alerts. Bitdefender has enhanced Bitdefender Digital Identity Protection, a service that monitors personal data in real-time by proactively scanning the internet including public sites, dark web, and underground forums for unauthorized leaks and data breaches that may put user accounts and identity at risk.

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.