It may come as a surprise to learn that 34% of security practitioners are in the…
Author: admin
CISA Warns of Active Exploitation of Microsoft SharePoint Vulnerability (CVE-2024-38094)
A high-severity flaw impacting Microsoft SharePoint has been added to the Known Exploited Vulnerabilities (KEV) catalog by the…
Permiso State of Identity Security 2024: A Shake-up in Identity Security Is Looming Large
Identity security is front, and center given all the recent breaches that include Microsoft, Okta, Cloudflare…
Kevin Mandia On GenAI Threats, Joining Up With MDR Vendor Expel
When it comes to generative AI, cybersecurity luminary Kevin Mandia believes the technology will end up…
Unisys, Check Point, Mimecast, Avaya Fined By SEC Over SolarWinds-Related Breaches
The U.S. Securities and Exchange Commission on Tuesday announced penalties against Unisys, Avaya, Check Point Software…
The Ultimate DSPM Guide: Webinar on Building a Strong Data Security Posture
Picture your company’s data as a vast, complex jigsaw puzzle—scattered across clouds, devices, and networks. Some…
U.S. and Allies Warn of Iranian Cyberattacks on Critical Infrastructure in Year-Long Campaign
Cybersecurity and intelligence agencies from Australia, Canada, and the U.S. have warned about a year-long campaign…
Graylog Redefines SIEM with More Efficient and Effective Threat Detection
These enhancements, and many others in the Fall 2024 release, help organizations realign their time and…
ESET Distributor’s Systems Abused to Deliver Wiper Malware
ESET has launched an investigation after the systems of its official product distributor in Israel were…
THN Cybersecurity Recap: Top Threats, Tools and News (Oct 14 – Oct 20)
Hi there! Here’s your quick update on the latest in cybersecurity. Hackers are using new tricks…