Security News

Best AI Security Tools: Top Solutions, Features & Comparisons
2024-10-28 13:00

Discover the best AI security tools, with top solutions, key features, and expert comparisons to help organizations enhance their cybersecurity.

Unclear pricing for GRC tools creates market confusion
2024-10-25 03:30

Due to widely varying government, risk, and compliance (GRC) tool pricing, enterprise risk management (ERM) leaders must understand four different pricing-tier categories of GRC solutions and...

Get Advanced Ad Blocking and Superior Data Privacy Tools for Just $11
2024-10-24 10:00

Block popups, banners and video ads while also protecting yourself from activity trackers, phishing attempts, fraudulent websites and other types of malware with AdGuard.

THN Cybersecurity Recap: Top Threats, Tools and News (Oct 14 - Oct 20)
2024-10-21 11:11

Hi there! Here’s your quick update on the latest in cybersecurity. Hackers are using new tricks to break into systems we thought were secure—like finding hidden doors in locked houses. But the...

THN Cybersecurity Recap: Top Threats, Tools and Trends (Oct 7 - Oct 13)
2024-10-14 10:43

Hey there, it's your weekly dose of "what the heck is going on in cybersecurity land" – and trust me, you NEED to be in the loop this time. We've got everything from zero-day exploits and AI gone...

Week in review: Microsoft fixes two exploited zero-days, SOC teams are losing trust in security tools
2024-10-13 08:00

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft patches two zero-days exploited in the wild (CVE-2024-43573, CVE-2024-43572) For October...

Cyberattack Group 'Awaken Likho' Targets Russian Government with Advanced Tools
2024-10-08 11:17

Russian government agencies and industrial entities are the target of an ongoing activity cluster dubbed Awaken Likho. "The attackers now prefer using the agent for the legitimate MeshCentral...

SOC teams are frustrated with their security tools
2024-10-07 03:30

Security operations center (SOC) practitioners believe they are losing the battle detecting and prioritizing real threats – due to too many siloed tools and a lack of accurate attack signal,...

15% of office workers use unsanctioned GenAI tools
2024-10-03 03:30

Rigid security protocols — such as complex authentication processes and highly restrictive access controls — can frustrate employees, slow productivity and lead to unsafe workarounds, according to...

5 Must-Have Tools for Effective Dynamic Malware Analysis
2024-10-02 11:00

Dynamic malware analysis is a key part of any threat investigation. It involves executing a sample of a malicious program in the isolated environment of a malware sandbox to monitor its behavior...