Tag: EN

Another Look at Accountability in Cybersecurity

Cybersecurity incidents are more than availability problems Malicious actors are using the legal process to their advantage Personal liability for cybersecurity mishandling is becoming more common Cybersecurity incidents, once dismissed as minor disruptions, have evolved into significant threats with far-reaching…

Ddostf DDoS Botnet Malware Targets MySQL Servers

Beware of a new threat in the cyber realm: the ‘Ddostf’ malware botnet is on the prowl, specifically targeting MySQL servers. This malicious botnet enslaves MySQL servers for a sinister purpose – running a DDoS-as-a-Service platform that can be rented…

SMBs face surge in “malware free” attacks

“Malware free” attacks, attackers’ increased reliance on legitimate tools and scripting frameworks, and BEC scams were the most prominent threats small and medium businesses (SMBs) faced in Q3 2023, says the inaugural SMB Threat Report by Huntress, a company that…

A bird’s eye view of your global attack surface

Get to know your external attack surface before the cyber criminals map it first Sponsored Post  Building an effective cyber security defense involves protecting the assets you know you have as well as the ones you don’t.… This article has…

Disable Windows Event Logging – Security Spotlight

The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about a technique attackers……

India’s CERT given exemption from Right To Information requests

Activists worry investigations may stay secret, and then there’s those odd incident reporting requirements India’s government has granted its Computer Emergency Response Team, CERT-In, immunity from Right To Information (RTI) requests – the nation’s equivalent of the freedom of information…

How passkeys are reshaping user security and convenience

In this Help Net Security interview, Anna Pobletts, Head of Passwordless at 1Password, talks about passkey adoption and its acceleration in 2024. This trend is particularly notable among highly-regulated services like fintech and banking, where users seek a sign-in experience…

Guarding the gateway: Securing dispersed networks

The network is at an inflection point, and organizations’ networks have become more dispersed amongst the cloud and on-prem, prompting a greater need for visibility today than ever. As the nature of the network shifts, teams face challenges securing their…

Product showcase: New ESET Home Security

ESET is thrilled to announce our new cutting-edge consumer solutions. Our consumer offering is more than just security – it is a comprehensive portfolio designed to keep our customers safe in today’s digital landscape. We are dedicated to advancing technology…

The Role of the CISO in Digital Transformation

A successful CISO should play a leading role in digital transformation and cloud migration initiatives in their organization. The CISO is responsible for making sure technical security controls are designed and implemented appropriately, and changes are properly managed, with security…

Report: The state of authentication security 2023

This survey set out to explore these challenges, to identify common practices, and to provide insight into how organizations can bolster their defenses. Key findings from the survey include: Current authentication practices Authentication-related cyberattacks Security incidents and impact Password management…