Security

Finding 365 bugs in Microsoft Office 365 – Help Net Security

Microsoft 365 is used by over a billion users worldwide, so attackers are naturally deeply...

Encryption-based threats grow by 260% in 2020 – Help Net Security

New Zscaler threat research reveals the emerging techniques and impacted industries behind a 260-percent spike...

ZeroNorth unites security and DevOps teams with Defect Density Dashboard – Help Net Security

ZeroNorth announced the availability of its Defect Density Dashboard, a new capability within its SaaS-based...

BotRx widgets provide analytical context on how attacks impact business operations – Help Net Security

BotRx announced new customizable Business Risk x-tension (BRx) that bridges the gap between application security...

New Kasada API protects from botnet attacks and targeted fraud – Help Net Security

Kasada, provider of the only online traffic integrity solution that accurately detects and defends against...

Palo Alto Networks introduces Enterprise Data Loss Prevention – Help Net Security

Palo Alto Networks introduced Enterprise Data Loss Prevention (DLP)—a cloud-delivered service that brings a fresh,...

ADTRAN announced Mosaic One, a cloud-based network and service optimization platform – Help Net Security

ADTRAN announced Mosaic One, a cloud-based network and service optimization platform that simplifies the deployment...

Viavi enables installation and maintenance of 5G NR and legacy 4G-LTE cell sites – Help Net Security

Viavi Solutions announced enhancements to the VIAVI OneAdvisor-800 all-in-one tool to streamline cell site maintenance...

PKWARE acquires Dataguise to expand global footprint – Help Net Security

PKWARE has acquired Dataguise, a company with innovative technology for businesses to discover and protect...

Latest articles

What to consider when shopping for cyber insurance

Cyber insurance is gaining favor in the business world. An expert offers tips on how...

BazarLoader Malware Abuses Slack, BaseCamp Clouds

Two cyberattack campaigns are making the rounds using unique social-engineering techniques. Source link

Update to REvil ransomware changes Windows passwords to automate file encryption via Safe Mode

The ransomware changes the device password to "DTrump4ever" and forces the device to log in...

iOS Kids Game Morphs into Underground Crypto Casino

A malicious ‘Jungle Run’ app tricked security protections to make it into the Apple App Store, scamming users out of money with...