Category: Security | TechRepublic

Phishing from threat actor TA473 targets US and NATO officials

These phishing campaigns are exploiting a Zimbra vulnerability and affecting internet-facing webmail services. Learn how to protect your organization from this security threat. The post Phishing from threat actor TA473 targets US and NATO officials appeared first on TechRepublic. This…

Company that launched 2FA pioneering AI for digital identity

Joe Burton, CEO of digital identity company Telesign, talks to TechRepublic about how the “fuzzy” realm between statistical analysis and AI can fuel global, fast, accurate identity. The post Company that launched 2FA pioneering AI for digital identity appeared first…

BYOD and personal apps: A recipe for data breaches

Some 43% of employees have been targeted with work-related phishing attacks on their personal devices, says a survey from SlashNext. The post BYOD and personal apps: A recipe for data breaches appeared first on TechRepublic. This article has been indexed…

Study: Women in cybersecurity feel excluded, disrespected

Feelings of exclusion and being disrespected impacts hiring opportunities and retention for women, according to a new report. The post Study: Women in cybersecurity feel excluded, disrespected appeared first on TechRepublic. This article has been indexed from Security | TechRepublic…

Nexus Android malware targets 450 financial applications

Learn how to protect your organization and users from this Android banking trojan. The post Nexus Android malware targets 450 financial applications appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the original article: Nexus…

DevSecOps puts security in the software cycle

Addressing cybersecurity can be a challenge when the focus is on speed in software development and production life cycles. The post DevSecOps puts security in the software cycle appeared first on TechRepublic. This article has been indexed from Security |…

8 best enterprise accounting software for 2023

Enterprise accounting software is designed for large companies and businesses. Here are the top eight enterprise accounting software suites. The post 8 best enterprise accounting software for 2023 appeared first on TechRepublic. This article has been indexed from Security |…

Ransomware gangs’ harassment of victims is increasing

The harassment reported by Palo Alto Networks Unit 42 typically takes the form of phone calls and emails directed toward employees, C-suite executives and even customers. The post Ransomware gangs’ harassment of victims is increasing appeared first on TechRepublic. This…

BECs double in 2022, overtaking ransomware

A look at 4th quarter 2022, data suggests that new threat surfaces notwithstanding, low-code cybersecurity business email compromises including phishing, as well as MFA bombing are still the prevalent exploits favored by threat actors. The post BECs double in 2022,…

New Hiatus malware campaign targets routers

A new malware dubbed HiatusRAT infects routers to spy on its targets, mostly in Europe and in the U.S. Learn which router models are primarily targeted and how to protect from this security threat. The post New Hiatus malware campaign…

How internet-facing webcams could put your organization at risk

By exploiting webcams and other IoT devices, hackers can spy on private and professional conversations, potentially giving them access to sensitive information, says BitSight. The post How internet-facing webcams could put your organization at risk appeared first on TechRepublic. This…

Become your business’s cybersecurity expert

Learn a wide variety of topics for a lifetime with this eclectic bundle. The post Become your business’s cybersecurity expert appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the original article: Become your business’s…

This 18-course ethical hacking bundle is under $50

Ethical hacking is a great skill to learn with new cyber threats on the rise. Learn how to fight back with this ethical hacking course bundle. The post This 18-course ethical hacking bundle is under $50 appeared first on TechRepublic.…

Top 10 open-source security and operational risks of 2023

Many software companies rely on open-source code but lack consistency in how they measure and handle risks and vulnerabilities associated with open-source software, according to a new report. The post Top 10 open-source security and operational risks of 2023 appeared…

1Password is looking to a password-free future. Here’s why

With phishing-based credentials theft on the rise, 1Password CPO Steve Won explains why the endgame is to ‘eliminate’ passwords entirely. The post 1Password is looking to a password-free future. Here’s why appeared first on TechRepublic. This article has been indexed…

Transmission of sensitive data policy

Data in transit means data is at risk if the proper precautions aren’t followed. Data stored inside a securely monitored environment is much less likely to fall into the wrong hands than data exchanged between people and systems. With this…

How to expand your search sources beyond Google and Bing

By exploring lesser known search engines such as WolframAlpha, Mojeek and Gigablast, you will get a wider range of results, customization and privacy options. The post How to expand your search sources beyond Google and Bing appeared first on TechRepublic.…

How to expand your search sources

Explore search services beyond Google and Bing for a wider range of results, customization and privacy options. The post How to expand your search sources appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the…

Mobile device management: Problems and solutions

Explore the MDM market with the CEO of Kolide to learn its challenges and the possible solutions for enterprises and end users. The post Mobile device management: Problems and solutions appeared first on TechRepublic. This article has been indexed from…

Security warning: Beep malware can evade detection

Find out how Beep malware can evade your security system, what it can do and how to protect your business. The post Security warning: Beep malware can evade detection appeared first on TechRepublic. This article has been indexed from Security…

Security awareness and training policy

This policy is designed to help your IT staff guide employees toward understanding and adhering to best security practices that are relevant to their job responsibilities. From the policy: SUMMARY A security policy is only as valuable as the knowledge…

Internet and email usage policy

Internet use in the course of conducting business is a foregone conclusion. For most industries, lacking access is an encumbrance, at best, to getting things done. However, significant risk accompanies internet access, such as viruses, ransomware and data theft, all…

Royal ransomware spreads to Linux and VMware ESXi

A new Linux version of Royal ransomware is targeting VMware ESXi virtual machines. Learn more about this security threat and how to protect from it. The post Royal ransomware spreads to Linux and VMware ESXi appeared first on TechRepublic. This…

New virtual data fabric to support DoD cyber testing

As cybersecurity threats increase in complexity and volume, the Department of Defense is turning to new technologies for help. The post New virtual data fabric to support DoD cyber testing appeared first on TechRepublic. This article has been indexed from…

Personal data encryption in Windows 11

There’s a new, more secure way to encrypt files in Windows 11, but it’s only an option for building secure applications, not a replacement for BitLocker. The post Personal data encryption in Windows 11 appeared first on TechRepublic. This article…

Metaverse adds new dimensions to Web 3.0 cybersecurity

With more companies investing in Web 3.0 this year, including blockchain, gaming and the metaverse, the cat and mouse game will continue, but with more dimensions. The post Metaverse adds new dimensions to Web 3.0 cybersecurity appeared first on TechRepublic.…

TrickGate crypter discovered after 6 years of infections

New research from Check Point Research exposes a crypter that stayed undetected for six years and is responsible for several major malware infections around the globe. The post TrickGate crypter discovered after 6 years of infections appeared first on TechRepublic.…

Lifetime VPNSecure subscriptions are now just $39.99

Secure your internet connection now with VPNSecure while it’s still on sale. The post Lifetime VPNSecure subscriptions are now just $39.99 appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the original article: Lifetime VPNSecure…

The importance of data retention policies

A data retention policy is the first step in helping protect an organization’s data and avoid financial, civil, and criminal penalties that increasingly accompany poor data management practices. This article outlines what a data retention policy is and why it’s…

Auditing and logging policy

Auditing and logging are essential measures for protecting mission-critical systems and troubleshooting problems. This policy outlines the appropriate auditing and logging procedures for computer systems, networks and devices that store or transport critical data. From the policy: Many computer systems,…

The headache of changing passwords

Change Your Password Day — an annual reminder of just how bad passwords really are. The post The headache of changing passwords appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the original article: The…

OneNote documents spread malware in several countries

A new phishing campaign abuses OneNote documents to infect computers with the infamous AsyncRAT malware, targeting users in the U.K., Canada and the U.S. The post OneNote documents spread malware in several countries appeared first on TechRepublic. This article has…

New cybersecurity BEC attack mimics vendors

A new business email attack threat actor is using a stealth tactic to avoid giveaways of typical social engineering attacks. Learn the best defense for protecting your company. The post New cybersecurity BEC attack mimics vendors appeared first on TechRepublic.…

Access management policy

Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the appropriate level of access in order to do their jobs, while…

Lifetime VPNSecure subscriptions are now just $39.99

Secure your internet connection now with VPNSecure while it’s still on sale. The post Lifetime VPNSecure subscriptions are now just $39.99 appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the original article: Lifetime VPNSecure…