The Ultimate DSPM Guide: Webinar on Building a Strong Data Security Posture

Picture your company’s data as a vast, complex jigsaw puzzle—scattered across clouds, devices, and networks. Some…

U.S. and Allies Warn of Iranian Cyberattacks on Critical Infrastructure in Year-Long Campaign

Cybersecurity and intelligence agencies from Australia, Canada, and the U.S. have warned about a year-long campaign…

Graylog Redefines SIEM with More Efficient and Effective Threat Detection

These enhancements, and many others in the Fall 2024 release, help organizations realign their time and…

ESET Distributor’s Systems Abused to Deliver Wiper Malware 

ESET has launched an investigation after the systems of its official product distributor in Israel were…

THN Cybersecurity Recap: Top Threats, Tools and News (Oct 14 – Oct 20)

Hi there! Here’s your quick update on the latest in cybersecurity. Hackers are using new tricks…

Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers

Cybersecurity researchers have discovered severe cryptographic issues in various end-to-end encrypted (E2EE) cloud storage platforms that…

North Korean IT Workers in Western Firms Now Demanding Ransom for Stolen Data

North Korean information technology (IT) workers who obtain employment under false identities in Western companies are…

Channel Women In Security: Understanding Risk In Digital Security

In the first episode of Channel Women in Security, Cass Cooper speaks with Rosanna Filingeri, Vice…

Security Flaw in Styra’s OPA Exposes NTLM Hashes to Remote Attackers

Details have emerged about a now-patched security flaw in Styra’s Open Policy Agent (OPA) that, if…

Cybercriminals Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks

Bad actors have been observed targeting Docker remote API servers to deploy the SRBMiner crypto miner on compromised…