Security News

7 Security and Compliance Tips From ISC2 Security Congress
2024-10-16 18:26

An IT and security compliance analyst distilled seven ways to forge effective synergies between IT and broader business goals.

Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity
2024-10-16 16:21

Threat actors are attempting to abuse the open-source EDRSilencer tool as part of efforts to tamper endpoint detection and response (EDR) solutions and hide malicious activity. Trend Micro said it...

Product showcase: Secure and scale your network with NordLayer’s advanced security solutions
2024-10-16 11:30

Cybersecurity threats have become increasingly prevalent and sophisticated in recent years, posing significant risks to businesses of all sizes. In 2023, there were 3,122 data breaches affecting...

Android 15 unveils new security features to protect sensitive data
2024-10-16 10:11

Android 15 brings enhanced security features to protect your sensitive health, financial, and personal data from theft and fraud. It also introduces productivity improvements for large-screen...

Strengthening Kubernetes security posture with these essential steps
2024-10-16 04:00

In this Help Net Security interview, Paolo Mainardi, CTO at SparkFabrik, discusses comprehensive strategies to secure Kubernetes environments from development through deployment. He focuses on...

Unlocking the value of AI-powered identity security
2024-10-16 03:00

While most organizations are still in the early horizons of their identity security journey, those who achieve maturity are seeing disproportionately higher returns for every dollar spent​,...

EDRSilencer red team tool used in attacks to bypass security
2024-10-15 18:47

A tool for red-team operations called EDRSilencer has been observed in malicious incidents attempting to identify security tools and mute their alerts to management consoles. [...]

Generative AI in Security: Risks and Mitigation Strategies
2024-10-15 18:18

Microsoft’s Siva Sundaramoorthy provides a blueprint for how common cyber precautions apply to generative AI deployed in and around security systems.

The Rise of Zero-Day Vulnerabilities: Why Traditional Security Solutions Fall Short
2024-10-15 11:00

In recent years, the number and sophistication of zero-day vulnerabilities have surged, posing a critical threat to organizations of all sizes. A zero-day vulnerability is a security flaw in...

The dark side of API security
2024-10-15 04:00

APIs are the backbone of digital transformation efforts, connecting applications across organizations, so their security is of the utmost importance. In this Help Net Security video, Lori...