May 2024

SoSafe Human Risk OS reduces human-related security risks
SoSafe introduced their pioneering Human Risk Operating System, The Human Risk OS, a set of capabilities designed to help customers identify, quantify, monitor, and intervene …

US retailers under attack by gift card-thieving cyber gang
Earlier this month, the FBI published a private industry notification about Storm-0539 (aka Atlas Lion), a Morocco-based cyber criminal group that specializes in compromising …

Huntress adds Active Remediation and macOS coverage to its EDR solution
Huntress announced that its Managed Endpoint Detection and Response (EDR) product now includes Active Remediation and macOS coverage. Huntress EDR previously included …

Picus Security introduces security validation for Kubernetes
Picus Security announced security validation for Kubernetes. This new capability allows Security and DevOps teams to realize the benefits of containers securely by proactively …

Google fixes yet another Chrome zero-day exploited in the wild (CVE-2024-5274)
For the eighth time this year, Google has released an emergency update for its Chrome browser that fixes a zero-day vulnerability (CVE-2024-5274) with an in-the-wild exploit. …

Illumio and Netskope join forces to strengthen enterprise resilience against cyberattacks
Illumio and Netskope announced a Zero Trust partnership that brings together the power of Zero Trust Segmentation (ZTS) and Zero Trust Network Access (ZTNA) to protect against …

Code42 partners with Mimecast to protect organizations from data leaks
Code42 announced that it has partnered with Mimecast to release Mimecast for Incydr Flows. The integrated solution helps to protect organizations from data leaks and theft by …

Product showcase: Alert – Data breach detector for your email, credit card, and ID
Compared to the last quarter of 2023, data breaches rose from 81M to 435M in Q1 2024. That’s a 5-fold increase in just a few months. One of the most common ways data breaches …

Fail2Ban: Ban hosts that cause multiple authentication errors
Fail2Ban is an open-source tool that monitors log files, such as /var/log/auth.log, and blocks IP addresses that exhibit repeated failed login attempts. It does this by …

Despite increased budgets, organizations struggle with compliance
Only 40% of organizations feel fully prepared to meet the compliance demands of rising cybersecurity regulations, according to a new Swimlane report. Organizations still feel …

Worried about job security, cyber teams hide security incidents
The frequency and severity of cyberattacks are increasing—yet most businesses remain unprepared, according to VikingCloud. Between a growing talent shortage, alert fatigue, …

Effective GRC programs rely on team collaboration
One in three organizations are not currently able to proactively identify, assess, and mitigate risk with their GRC program, nor are they able to ensure compliance with …
Featured news
Resources
Don't miss
- Attackers are exploiting critical SAP S/4HANA vulnerability (CVE-2025-42957)
- Stealthy attack serves poisoned web pages only to AI agents
- September 2025 Patch Tuesday forecast: The CVE matrix
- Google fixes actively exploited Android vulnerabilities (CVE-2025-48543, CVE-2025-38352)
- CyberFlex: Flexible Pen testing as a Service with EASM