LibreOffice, the most widely used open-source office productivity suite, has plenty to recommend it: it’s feature-rich, user-friendly, well-documented, reliable, has an active community of developers working on improving it, and it’s free. The suite includes Writer (word processor), Calc (a…
Category: Help Net Security
Shifting left and right, innovating product security
In this Help Net Security interview, Slava Bronfman, CEO at Cybellum, discusses approaches for achieving product security throughout a device’s entire lifecycle, fostering collaboration across business units and product lines, ensuring transparency and security in the supply chain, and meeting…
How cybercriminals use look-alike domains to impersonate brands
Cybercriminals create hundreds of thousands of counterfeit domains that mimic well-known brands for financial gain. These fake domains serve multiple malicious purposes, such as sending phishing emails, hosting fraudulent websites, rerouting web traffic, and distributing malware. In this Help Net…
Baseline standards for BYOD access requirements
49% of enterprises across Europe currently have no formal Bring-Your-Own-Device (BYOD) policy in place, meaning they have no visibility into or control over if and how employees are connecting personal devices to corporate resources, according to a Jamf survey. With…
Cybersecurity pros battle discontent amid skills shortage
The cybersecurity skills crisis continues in a multi-year freefall that has impacted 71% of organizations and left two-thirds of cybersecurity professionals stating that the job has become more difficult over the past two years—while 60% of organizations continue to deflect…
Insight Managed Cloud Services streamline cloud management
Insight Enterprises has expanded its services portfolio with a new global managed cloud offering to simplify how enterprises scale their cloud use. Insight Managed Cloud Services enable a fully managed experience that lifts the burden of cloud management from IT…
Old vulnerabilities are still a big problem
A recently flagged phishing campaign aimed at delivering the Agent Tesla RAT to unsuspecting users takes advantage of old vulnerabilities in Microsoft Office that allow remote code execution. “Despite fixes for CVE-2017-11882/CVE-2018-0802 being released by Microsoft in November, 2017 and…
Netskope acquires Kadiska for enhanced network and app performance monitoring
Netskope has acquired Kadiska. The news follows the announcement last week of enhancements to Netskope’s Digital Experience Management (DEM) capabilities with the introduction of Netskope Proactive DEM (P-DEM), and cements Netskope’s advances in the ability to monitor and proactively remediate…
D2iQ DKP 2.6 improves Kubernetes management capabilities
D2iQ announced the newest updates to its multi-cluster Kubernetes management platform, D2iQ Kubernetes Platform (DKP). DKP 2.6 features the new DKP AI Navigator, an AI assistant that enables enterprise organizations to overcome the skills gap, one of the biggest challenges…
CyberSaint launches Remediation Suite to optimize resource allocation and decision-making
CyberSaint has launched the Remediation Suite within the CyberStrong platform. With the Remediation Suite, CISOs and cyber risk professionals gain access to a toolkit to efficiently prioritize, quantify, track and communicate remediation efforts across controls and risks, leading to optimized…
Cybercriminals target MS SQL servers to deliver ransomware
A cyberattack campaign is targeting exposed Microsoft SQL (MS SQL) databases, aiming to deliver ransomware and Cobalt Strike payloads. The attack campaign The attackers target exposed MS SQL servers by brute-forcing access credentials. After having successfully authenticated, they start enumerating…
TXOne Networks Edge V2 isolates security breaches
TXOne Networks announced the second generation of its Edge engine for eliminating the spread of operational technology (OT) network infections and safeguarding reliable operations. Edge V2 delivers automatic rule generation, enabling effortless network segmentation in complex, large-scale OT environments. Our…
Fasoo collaborates with Egnyte to simplify data governance
Fasoo and Egnyte announced a partnership that will allow organizations to encrypt any Egnyte-managed file and inject Egnyte permissions directly into the protected file, ensuring that governance is maintained wherever the file goes. Colter Carambio, EVP and CRO at Fasoo,…
NTT launches Samurai XDR SaaS to strengthen detection and response capabilities across the network
NTT Security Holdings launched Samurai XDR SaaS, making their threat detection and response system accessible to organizations of all sizes for just $40 per endpoint per year. The cloud-hosted solution requires no infrastructure deployment, providing SMBs an affordable way to…
Cloudera partners with AWS to help organizations accelerate their modernization to the cloud
Cloudera announced that it has signed a Strategic Collaboration Agreement (SCA) with AWS. This agreement strengthens Cloudera’s relationship with AWS and demonstrates their commitment to accelerate and scale cloud native data management and data analytics on AWS. Through this agreement,…
MITRE Caldera for OT now available as extension to open-source platform
MITRE Caldera for OT is now publicly available as an extension to the open-source Caldera platform, allowing security teams to run automated adversary emulation exercises that are specifically focused on threats to operational technology (OT). The first Caldera for OT…
Compliance budgets under strain as inflation and workload grow
Compliance leaders are facing pressure to make the most of existing resources despite economic challenges and increased workload volume and complexity, according to Gartner. To face these challenges, leaders must address three crucial compliance function trends this year: tighter budgets,…
Cyber talent gap solutions you need to know
90% of consumers across the US and UK are concerned about cybersecurity’s future if students aren’t exposed to the field at an earlier age, according to ThreatX. 88% are worried that today’s talent shortage will negatively impact protection of their…
Emerging threat: AI-powered social engineering
Social engineering is a sophisticated form of manipulation but, thanks to AI advancements, malicious groups have gained access to highly sophisticated tools, suggesting that we might be facing more elaborate social engineering attacks in the future. It is becoming increasingly…
CIS Benchmarks Communities: Where configurations meet consensus
Have you ever wondered how technology hardening guidelines are developed? Some are determined by a particular vendor or driven by a bottom-line perspective. That’s not the case with the CIS Benchmarks. They’re the only consensus-developed security configuration recommendations both created…