Tag: Help Net Security

Everbridge 360 helps organizations optimize their response efforts

Everbridge has launched Everbridge 360, which empowers organizations to manage critical events, minimize communication delays, and enhance overall operational resilience through a unified dashboard. “At Everbridge, our mission is to ensure the safety of people and continuity of organizations in…

Bitwarden strengthens security with SSO integrations for businesses

Bitwarden delivers single sign-on integrations for businesses. With the recent addition of SSO with Trusted Devices, the company extends the security, flexibility, and convenience of its products. “Bitwarden provides businesses with the most effective and innovative credential management solutions that…

MetaStealer malware is targeting enterprise macOS users

Enterprise macOS users are being targeted by attackers slinging new information-stealing malware dubbed MetaStealer. The MetaStealer malware MetaStealer is delivered within malicious disk image format (.dmg) files. The names of the files – such as Advertising terms of reference (MacOS…

The rise and evolution of supply chain attacks

A supply chain attack is a cyberattack that focuses on a third-party supplier providing essential services or software to the supply chain. In this Help Net Security video, Dick O’Brien, Principal Intelligence Analyst in the Symantec Threat Hunter team, discusses…

Serial cybersecurity founders get back in the game

“I didn’t really have a choice,” says Ben Bernstein, the former CEO and co-founder of Twistlock (acquired by Palo Alto Networks in 2019) and the CEO and co-founder of a new cybersecurity startup that is still in stealth. “Building a…

How should SMBs navigate the phishing minefield?

In this Help Net Security interview, Pete Hoff, CISO at Wursta, offers advice to SMB security leaders and professionals on how to minimize the threat phishing presents to their organization’s operations and long-term success. What makes phishing attacks particularly challenging…

Latest fraud schemes targeting the payments ecosystem

Threat actors continued to exploit technical misconfigurations through various fraud schemes, according to a new report from Visa. These include the use of malvertising and search engine optimization (SEO) techniques to cultivate compelling and effective phishing and social engineering campaigns,…

GCX launches GNSX in partnership with Palo Alto Networks

Global Cloud Xchange (GCX) has launched GNSX, a managed solution that delivers global end-to-end, zero trust hybrid networking coupled with real-time visibility, security, and control, all backed by user experience metrics and Experience Level agreements (XLAs). A seamless integration of…

CTERA Vault safeguards against risks related to data tampering

CTERA unveiled CTERA Vault, Write Once, Read Many (WORM) protection technology which provides regulatory compliant storage for the CTERA Enterprise Files Services Platform. CTERA Vault aids enterprises in guaranteeing the preservation and tamperproofing of their data, while also ensuring compliance…