November 2022

Group indicted for breaching CPA, tax preparation firms via stolen credentials
United States Attorney Roger B. Handberg announces the partial unsealing of an indictment charging eight individuals with Racketeer Influenced and Corrupt Organizations (RICO) …

Qualys TotalCloud with FlexScan helps enterprises strengthen cloud-native security
Qualys announced TotalCloud with FlexScan delivering cloud-native VMDR with Six Sigma Accuracy via agent and agent-less scanning for comprehensive coverage of cloud-native …

Meet fundamental cybersecurity needs before aiming for more
In this interview for Help Net Security, Mike Lefebvre, Director of Cybersecurity at SEI Sphere, talks about the hierarchy of cybersecurity needs and what should be done to …

How to deal with burnout when you’re the CISO
CISOs are working overtime and can’t always switch off from work, according to a recent Tessian report. Recent headlines have shown that security stakes have never been …

Alternatives to a lift-and-shift cloud migration strategy
For most organizations operating in today’s digital landscape, shifting even their most mission-critical workloads from traditional on-premises or colocation-based data …

32% of cybersecurity leaders considering quitting their jobs
32% of CISOs or IT Security DMs in the UK and US are considering leaving their current organization, according to a research from BlackFog. Of those considering leaving their …

Whitepaper: Shared responsibility model for cloud security
With high chances of user error, limited security resources, and constantly evolving computing environments, commercial and public organizations need cybersecurity resources …

IDC Analyst Brief reveals how passwords aren’t going away
Passwords are the keys to the kingdom. Hardening the password security layer requires a multistep approach. img …

Forescout Continuum Timeline accelerates threat detection for cybersecurity teams
Forescout Technologies has released its latest Continuum platform update which includes Forescout Continuum Timeline, a new cloud-native solution that provides long-term …

High-severity OpenSSL vulnerabilities fixed (CVE-2022-3602, CVE-2022-3786)
Version 3.0.7 of the popular OpenSSL cryptographic library is out, with fixes for CVE-2022-3602 and CVE-2022-3786, two high-severity buffer overflow vulnerabilities in the …

Resecurity platform now available on the Oracle Cloud Marketplace
The Resecurity Cyber Threat Intelligence (CTI) and Digital Risk Monitoring (DRM) Platform is now available on the Oracle Cloud Marketplace. The addition to the Oracle Cloud …

Following Log4j: Supporting the developer community to secure IT
How bad was the Log4j vulnerability for open source’s reputation? One of the most high-profile exploits in recent years, it even led to a government advisory from the UK’s …
Featured news
Resources
Don't miss
- Attackers are exploiting critical SAP S/4HANA vulnerability (CVE-2025-42957)
- Stealthy attack serves poisoned web pages only to AI agents
- September 2025 Patch Tuesday forecast: The CVE matrix
- Google fixes actively exploited Android vulnerabilities (CVE-2025-48543, CVE-2025-38352)
- CyberFlex: Flexible Pen testing as a Service with EASM