Tag: EN

How organizations can navigate identity security risks in 2024

Managing IAM challenges in hybrid IT environments requires a holistic approach, integrating solutions and automating processes to ensure effective access controls and operational efficiency. In this Help Net Security interview, Deepak Taneja, CEO of Zilla Security, discusses identity security risks…

Ransomware infection reach extends to Data Backups

For years, IT experts have emphasized the importance of maintaining backups for data and applications, highlighting their crucial role in swiftly recovering from cyber-attacks. Indeed, having such backup systems in place can preserve data continuity during unexpected incidents, thereby minimizing…

Cryptojacking is no longer the sole focus of cloud attackers

As commercial adoption of cloud technologies continues, cloud-focused malware campaigns have increased in sophistication and number – a collective effort to safeguard both large and small enterprises is critical, according to Cado Security. Docker remains the most frequently targeted for…

Infosec products of the month: February 2024

Here’s a look at the most interesting products from the past month, featuring releases from: Appdome, BackBox, Center for Internet Security, Cisco, CompliancePro Solutions, Cyberhaven, LOKKER, ManageEngine, Metomic, OPSWAT, Pindrop, ProcessUnity, Qualys, SentinelOne, Sumsub,Truffle Security, Vade Secure, and Varonis. CIS…

The CISO’s guide to reducing the SaaS attack surface

SaaS sprawl introduces security risks, operational headaches, and eye-popping subscription costs. Download this guide to learn how to implement a strategic approach to reducing your SaaS attack surface without slowing down the business. Inside the guide, you’ll find: Tools and…

Australian spy chief fears sabotage of critical infrastructure

And accuses a former Australian politician of having ‘sold out their country’ The director general of security at Australia’s Security Intelligence Organisation (ASIO) has delivered his annual threat assessment, revealing ongoing attempts by adversaries to map digital infrastructure with a…

Safe Online Shopping: Protecting Your Financial Data

Concerned about the safety of your financial data while shopping online? Discover essential tips to protect yourself from cybercriminals and enjoy worry-free online shopping. The post Safe Online Shopping: Protecting Your Financial Data appeared first on Security Zap. This article…

Securing Smart Cameras and Baby Monitors

Discover the crucial steps you need to take to secure your smart cameras and baby monitors against potential security threats and breaches. The post Securing Smart Cameras and Baby Monitors appeared first on Security Zap. This article has been indexed…

Cutout.Pro – 19,972,829 breached accounts

In February 2024, the AI-powered visual design platform Cutout.Pro suffered a data breach that exposed 20M records. The data included email and IP addresses, names and salted MD5 password hashes which were subsequently broadly distributed on a popular hacking forum…