Security News

THN Cybersecurity Recap: Last Week's Top Threats and Trends (September 16-22)
2024-09-23 11:20

Hold on tight, folks, because last week's cybersecurity landscape was a rollercoaster! We witnessed everything from North Korean hackers dangling "dream jobs" to expose a new malware, to a...

10 Common Cybersecurity Threats and How to Handle Them
2024-09-16 16:00

Cybersecurity has always been an arms race where the enemy’s arsenal is more sophisticated than ever. These attacks are getting smarter, faster, and costlier, thanks to the advent of generative AI...

Apple Drops Spyware Case Against NSO Group, Citing Risk of Threat Intelligence Exposure
2024-09-16 07:12

Apple has filed a motion to "voluntarily" dismiss its lawsuit against commercial spyware vendor NSO Group, citing a shifting risk landscape that could lead to exposure of critical "threat...

Top 3 Threat Report Insights for Q2 2024
2024-09-12 10:51

Cato CTRL (Cyber Threats Research Lab) has released its Q2 2024 Cato CTRL SASE Threat Report. The report highlights critical findings based on the analysis of a staggering 1.38 trillion network...

Hiring Kit: Cyber Threat Hunter
2024-09-10 16:00

Professional cyber threat hunters complement cybersecurity programs focusing on potential threats and vulnerabilities that may breach automated cybersecurity tools and traditional systems. These...

How human-led threat hunting complements automation in detecting cyber threats
2024-09-10 04:00

In this Help Net Security interview, Shane Cox, Director, Cyber Fusion Center at MorganFranklin Consulting, discusses the evolving methodologies and strategies in threat hunting and explains how...

Strengthening enterprise storage against cyber threats
2024-09-09 15:11

Watch this webinar for tips on enhancing resilience with advanced protection strategies Webinar As cyberattacks like ransomware and malware grow more sophisticated, organizations need to ensure...

North Korean Threat Actors Deploy COVERTCATCH Malware via LinkedIn Job Scams
2024-09-07 07:28

Threat actors affiliated with North Korea have been observed leveraging LinkedIn as a way to target developers as part of a fake job recruiting operation. These attacks employ coding tests as a...

Homeland security hopes to scuttle maritime cyber-threats with port infosec testbed
2024-09-05 23:51

Supply chains, 13M jobs and $649B a year at risk, so Uncle Sam is fighting back - with a request for info The US Department of Homeland Security is seeking help to assess the security of tech at...

New Eucleak attack lets threat actors clone YubiKey FIDO keys
2024-09-04 17:48

A new "EUCLEAK" flaw found in FIDO devices using the Infineon SLE78 security microcontroller, like Yubico's YubiKey 5 Series, allows attackers to extract Elliptic Curve Digital Signature Algorithm...