North Korean-linked hackers were caught experimenting with new macOS malware

Researchers can’t tell if the malware was used in a campaign, or North Korean operatives were caught before they could deploy it in the wild.

The post North Korean-linked hackers were caught experimenting with new macOS malware appeared first on CyberScoop.

Continue reading North Korean-linked hackers were caught experimenting with new macOS malware

Photos: Infosecurity Europe 2024

Infosecurity Europe is taking place at ExCel London from 4-6 June 2024. Help Net Security is on-site. This gallery takes you inside the event. The featured vendors are: Plainsea, Qualys, Akamai, Microsoft, Bridewell, Adaptive Shield, Jamf.
The post Pho… Continue reading Photos: Infosecurity Europe 2024

The next wave of mobile threats

According to McAfee, apps, whether for communication, productivity, or gaming, are among the biggest threats to mobile security. Technavio expects the global mobile security software market to grow by $2.75 billion between 2020 and 2025, expanding at a… Continue reading The next wave of mobile threats

Why it’s the perfect time to reflect on your software update policy

The threat landscape is evolving by the minute, with both malicious actors and well-intentioned researchers constantly on the hunt for new attack vectors that bypass security controls and gain control of systems and applications. In fact, thousands of … Continue reading Why it’s the perfect time to reflect on your software update policy

Baseline standards for BYOD access requirements

49% of enterprises across Europe currently have no formal Bring-Your-Own-Device (BYOD) policy in place, meaning they have no visibility into or control over if and how employees are connecting personal devices to corporate resources, according to a Jam… Continue reading Baseline standards for BYOD access requirements

Black Hat USA 2022 video walkthrough

In this Help Net Security video, we take you inside Black Hat USA 2022 at the Mandalay Bay Convention Center in Las Vegas. The video features the following vendors: Abnormal Security, Adaptive Shield, Airgap, Akamai, Anomali, Arctic Wolf Networks, Aris… Continue reading Black Hat USA 2022 video walkthrough

Okta Workflows automates identity processes and accelerates innovation

Okta announced the availability of Okta Workflows as a standalone offering for all customers. Okta Workflows now addresses a broadened set of identity automation use cases beyond Lifecycle Management capabilities, including advanced security orchestrat… Continue reading Okta Workflows automates identity processes and accelerates innovation

SafeBase unveils Subscribe feature to deliver periodic reviews of critical vendors for enterprise customers

SafeBase announced its newest feature, Subscribe. On top of the already robust portal, which includes the Security Status Page, NDA automation, and Knowledge Base, SafeBase is now the go-to place when communicating important updates about your company&… Continue reading SafeBase unveils Subscribe feature to deliver periodic reviews of critical vendors for enterprise customers

Acronis Cyber Protect Cloud’s protection pack boosts cybersecurity for MSPs

Acronis announced a new advanced protection pack for its service provider solution, Acronis Cyber Protect Cloud. The new Advanced File Sync and Share pack builds on the essential file-sharing capabilities included in Acronis Cyber Protect Cloud, layeri… Continue reading Acronis Cyber Protect Cloud’s protection pack boosts cybersecurity for MSPs

Apple fixes macOS zero-day exploited by malware (CVE-2021-30713)

A zero-day vulnerability (CVE-2021-30713) that allowed XCSSET malware to surreptitiously take screenshots of the victim’s desktop has been fixed by Apple on macOS 11.4 (Big Sur) on Monday. The XCSSET malware and its CVE-2021-30713 exploitation Di… Continue reading Apple fixes macOS zero-day exploited by malware (CVE-2021-30713)