20 Hottest Cybersecurity Products At RSAC 2023 | CRN

20 Hottest Cybersecurity Products At RSAC 2023 | CRN

Security News Kyle Alspach April 25, 2023, 11:57 AM EDT At RSA Conference 2023 this week, vendors are showcasing new products in categories including XDR, email security, vulnerability management and application security. Proofpoint Threat Protection Updates At the start of RSAC 2023, Proofpoint unveiled new capabilities for its Aegis Threat Protection platform that aim to help with thwarting attacks based on account takeovers. The new capabilities include Supplier Threat Protection, which…

Read More

Sixty-three percent of CISOs predict hybrid or remote work to remain

Sixty-three percent of CISOs predict hybrid or remote work to remain

63% of CISOs predict hybrid or remote work to remain for years | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Cybersecurity lessons learned from a bike manufacturer

Cybersecurity lessons learned from a bike manufacturer

Cybersecurity lessons learned from a bike manufacturer | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

The security implications of using ChatGPT in the workplace

The security implications of using ChatGPT in the workplace

The security implications of using ChatGPT in the workplace | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

SSE versus SASE: What’s the real difference?

SSE versus SASE: What’s the real difference?

SSE versus SASE: What’s the real difference? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Winter Vivern APT Targets European Government Entities with Zimbra Vulnerability

Winter Vivern APT Targets European Government Entities with Zimbra Vulnerability

Mar 31, 2023Ravie LakshmananCyber Espionage / APT The advanced persistent threat (APT) actor known as Winter Vivern is now targeting officials in Europe and the U.S. as part of an ongoing cyber espionage campaign. “TA473 since at least February 2023 has continuously leveraged an unpatched Zimbra vulnerability in publicly facing webmail portals that allows them to gain access to the email mailboxes of government entities in Europe,” Proofpoint said in a new report. The enterprise…

Read More

Network visibility and security gaps due to remote work challenge IT

Network visibility and security gaps due to remote work challenge IT

Network visibility and security gaps due to remote work challenge IT | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Post-Macro World Sees Rise in Microsoft OneNote Documents Delivering Malware

Post-Macro World Sees Rise in Microsoft OneNote Documents Delivering Malware

Feb 03, 2023Ravie LakshmananAttack Vector / Endpoint Security In a continuing sign that threat actors are adapting well to a post-macro world, it has emerged that the use of Microsoft OneNote documents to deliver malware via phishing attacks is on the rise. Some of the notable malware families that are being distributed using this method include AsyncRAT, RedLine Stealer, Agent Tesla, DOUBLEBACK, Quasar RAT, XWorm, Qakbot, BATLOADER, and FormBook. Enterprise security firm Proofpoint said it…

Read More

Protect Your Network with Zero-Day Threat Protection

Protect Your Network with Zero-Day Threat Protection

Zero-day threats refer to a class of vulnerabilities that are detected in a system or device but have yet to be patched by the vendor community. Typically targeted towards a specific company, device, or application, a successful zero-day attack can inflict significant damage across an organization. For example, DataProt reports that ransomware attacks are expected to occur every 11 seconds and cost over $20 billion globally per annum. Past experience indicates that threat actors target…

Read More

Jason Loomis named Chief Information Security Officer at Freshworks

Jason Loomis named Chief Information Security Officer at Freshworks

Jason Loomis named Chief Information Security Officer at Freshworks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 4 5 6 7 8 11