Help Net Security

A flaw in ConnectWise Control spurred the company to make life harder for scammers

A vulnerability in popular remote access service/platform ConnectWise Control could have been leveraged by scammers to make compromising targets’ computers easier, Guardio researchers have discovered.

The emergence of zero trust consumers

A survey from Daon shows 92% of consumers believe cybersecurity threats will continue to outpace cybersecurity technology, with 91% willing to take extra security measures to prove their identity on an ongoing basis to protect their assets.

How entrepreneurs can capitalize on the impending golden age of cybersecurity

The stark dissonance between the highs of 2021 and what seems to be a cooled-off 2022 has some security professionals and CEOs concerned that this downturn will become the new long-term reality.

90% of organizations have Microsoft 365 security gaps

Research from a CoreView study reveals that many common security procedures are not being followed 100% of the time. This leaves gaping holes in most organizations’ security defenses.

The pros and cons of using open-source Kubernetes security software

In a survey by ARMO, 55% of respondents said they used at least some open-source tools to keep their Kubernetes clusters safe; this includes those who use purely open-source and those who mix open-source and proprietary solutions.

5 free resources from the Cybersecurity and Infrastructure Security Agency (CISA)

CISA is in charge of enhancing cybersecurity and infrastructure protection at all levels of government, coordinating cybersecurity initiatives with American U.S. states, and enhancing defenses against cyberattacks.

Top passwords used in RDP brute-force attacks

While attacks on RDP ports grew during the COVID-19 pandemic as a result of the rise of remote work, the port has continued to be a popular attack method for criminals despite many workers returning to the office.

Transportation sector targeted by both ransomware and APTs

In the US alone, ransomware activity increased 100% quarter over quarter in transportation and shipping. Globally, transportation was the second most active sector after telecom. APTs were also detected in transportation more than in other sectors.

Why companies can no longer hide keys under the doormat

CIOs need to ask their management leads or teams how private keys are protected and what exposure gap they might face during processing. The same is true for executing data and code that is otherwise encrypted at rest and in motion.

ThreatLocker acquires Third Wall to provide endpoint protection for MSPs

Managed Service Providers (MSPs) using ThreatLocker's solutions will now be able to harden Windows operating systems, ensure end-users comply with government regulations, and strengthen their overall security posture.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags