Security News

Unified Threat Management: The All-in-One Cybersecurity Solution
2022-08-16 11:04

UTM is thought to be an all-in-one solution for cybersecurity. In general, it is a versatile software or hardware firewall solution integrated with IPS and other security services.

2022 Threat Report
2022-08-12 00:00

It covers elements of critical infrastructure exploitation, adversarial artificial intelligence, initial access brokers, critical event management, extended detection and response, and other issues shaping our current security environment. This report covers topics confronting individuals and organizations around the world.

The Business of Hackers-for-Hire Threat Actors
2022-08-10 10:20

For the most part, hackers don't even have to hide in the dark recesses of the web to take advantage of people any longer; they can be found right in plain sight on social media sites or forums, professionally advertised with their websites, and may even approach you anonymously through such channels as Twitter. A series of new DDoS for Hire are commoditizing the art of hacking and reducing the barrier to launching DDoS attacks.

Majority of SMBs lack 24/7 security operations to detect threats
2022-08-10 08:00

Cybercriminals and threat actors work around the clock, with attacks originating from around the world. All businesses, including SMBs, need to be always on alert for new threats and available to respond at any moment to an incident.

Real-world threat response: What are organizations doing wrong?
2022-08-10 05:00

In this video interview with Help Net Security, Stephanie Aceves, Sr. Director of Threat Response, Product Management at Tanium, talks about what organizations are doing wrong when it comes to threat response. Aceves illustrates interesting situations she encountered during ethical hacking engagements, and offers advice to CISOs that want to hire a red team.

How older security vulnerabilities continue to pose a threat
2022-08-08 17:00

Patching security vulnerabilities should be a straightforward process. A report released Monday, August 8, by security firm Rezillion looks at how older vulnerabilities patched by the vendor still pose risks to organizations.

Threats targeting fintech companies are on the rise
2022-08-05 08:00

In Q1 of 2022, fintech companies experienced 2.5 times more attacks than in the two previous years. The growing rate of cybercrime has added to the market unrest and questioned fintech preparedness; some claimed that the industry players are more susceptible to virtual threats than traditional banking, with greater resources at their disposal.

Businesses lack visibility into run-time threats against mobile apps and APIs
2022-08-04 08:00

A new report from Osterman Research codifies the increasing dependence of businesses upon their mobile apps, and reveals a jarring disconnect between the strategic importance of apps versus the level of focus and resources applied to protect organizational apps against runtime threats. This Help Net Security video reveals how run-time security threats against mobile apps and APIs continue to inflict damage on organizations.

Microsoft widens enterprise access to its threat intelligence pool
2022-08-03 21:31

Microsoft says it will give enterprise security operation centers broader access to the massive amount of threat intelligence it collects every day.Both services - Defender Threat Intelligence and Defender External Attack Surface Management - use technologies that Microsoft inherited when it bought cybersecurity company RiskIQ for $500 million in 2021.

Sonatype shines light on typosquatting ransomware threat in PyPI
2022-08-03 17:15

Miscreants making use of typosquatting are being spotted by researchers at Sonatype, emphasizing the need to check that the package is really the one you meant to download. The latest packages detected use variations of the spelling of "Requests", a hugely popular HTTP library available via PyPI. Of the project, the description notes: "Requests is one of the most downloaded Python packages today, pulling in around 30M downloads / week - according to GitHub. Requests is currently depended upon by 1,000,000+ repositories." Focusing on the requesys package, researchers found scripts that would stomp over Windows user's folders and begin encrypting files.