November 2022
Week in review: 5 free CISA resources, surviving a DDoS attack, Google to make Cobalt Strike useless
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Google seeks to make Cobalt Strike useless to attackers Google Cloud’s …
New infosec products of the week: November 25, 2022
Here’s a look at the most interesting products from the past week, featuring releases from Solvo, Sonrai Security, and Spring Labs. Sonrai Risk Insights Engine empowers …
Overcoming unique cybersecurity challenges in schools
A school’s ecosystem is far different from that of the typical enterprise. Not only does a school district face the monumental task of educating our upcoming generations, but …
Introducing the book: The Security Analyst’s Guide to Suricata
In this Help Net Security video interview, Eric Leblond, CTO at Stamus Networks, talks about The Security Analyst’s Guide to Suricata, a book he co-wrote with Peter Manev. Key …
5 cybersecurity predictions for 2023
The cyber game is now an entire underground economy wrapped around cyberattacks. Thanks to increased international friction and the activity of groups such as Lapsus$, …
Check Point launches CyberUp program to support Israel’s growing network of cybersecurity start-ups
Check Point has launched its CyberUp program, an initiative that will support Israel’s growing network of cybersecurity start-ups by opening up market opportunities with its …
How cloud PCs act as an insurance plan for ransomware recovery
Although companies are spending billions on preventative security measures, attacks are a common occurrence. Business continuity requires enterprises to go beyond prevention …
The safest datacenter is the one that works best
A recent Gartner study found that organizations’ overall spending on datacenters is set to amount to $221B in 2023 – a predicted rise of 11.3% in spending since 2021. It’s …
The emergence of zero trust consumers
A survey report from Daon shows 92% of consumers believe that cybersecurity threats will continue to outpace cybersecurity technology, with 91% willing to take extra security …
Redis and AWS extend partnership to accelerate cloud migration and application development
Redis has unveiled a multi-year strategic collaboration agreement (SCA) with Amazon Web Services (AWS). Building on the companies’ existing work together, this agreement will …
A flaw in ConnectWise Control spurred the company to make life harder for scammers
A vulnerability in popular remote access service/platform ConnectWise Control could have been leveraged by scammers to make compromising targets’ computers easier, …
Fake subscription invoices lead to corporate data theft and extortion
A threat actor dubbed Luna Moth has been leveraging social engineering and legitimate software to steal sensitive data and extort money from small and medium-size businesses. …
Featured news
Resources
Don't miss
- How neighbors could spy on smart homes
- How the City of Toronto embeds security across governance and operations
- Hottest cybersecurity open-source tools of the month: October 2025
- OpenAI’s gpt-oss-safeguard enables developers to build safer AI
- Sanctions won’t stop cyberattacks, but they can still “bite”