June 2024

SELKS: Open-source Suricata IDS/IPS, network security monitoring, threat hunting
SELKS is a free, open-source, turnkey solution for Suricata-based network intrusion detection and protection (IDS/IPS), network security monitoring (NSM), and threat hunting. …

Cybersecurity jobs available right now: June 19, 2024
Some of the jobs listed here are no longer accepting applications. For a fresh list of open cybersecurity jobs, go here. Application Penetration Tester ShiftCode Analytics | …

Find out which cybersecurity threats organizations fear the most
This article compiles excerpts from various reports, presenting statistics and insights on cybersecurity threats faced by businesses and individuals alike. Cyber insurance …

Rising exploitation in enterprise software: Key trends for CISOs
Action1 researchers found an alarming increase in the total number of vulnerabilities across all enterprise software categories. “With the NVD’s delay in associating Common …

Huntress raises $150 million to boost cybersecurity for businesses
Huntress announced a significant milestone with the closure of a $150 million Series D funding round led by Kleiner Perkins, Meritech Capital, and existing investor Sapphire …

Atsign NoPorts establishes an encrypted IP tunnel directly between devices
Atsign introduces NoPorts to offer a secure remote access solution, exceeding current limitations and setting a new standard for secure connectivity. NoPorts establishes an …

Medibank breach: Security failures revealed (lack of MFA among them)
The 2022 Medibank data breach / extortion attack perpetrated by the REvil ransomware group started by the attackers leveraging login credentials stolen from a private computer …

NinjaOne MDM provides visibility and control over mobile devices
NinjaOne has expanded its platform with mobile device management (MDM). The new solution increases employee productivity and reduces complexity, risk, and costs for IT teams …

Next DLP Secure Data Flow prevents data theft
Next DLP launched Secure Data Flow, a capability within the Reveal Platform that uses the “What, Where, Who and How” of data’s origin, movements and modifications …

Fraudely empowers SMBs to protect their employees against phishing attacks
Fraudely announced a low-cost, setup-free solution to enable SMBs to immediately protect their employees against phishing attacks. Phishing scams remain one of the most …

Veritas Data Insight classifies and controls unstructured data
Veritas Technologies announced better choice and flexibility for customers requiring data compliance solutions. Veritas Data Insight, which allows organizations to assess and …

Entro Security raises $18 million to scale its global operations
Entro Security announced it has closed an $18 million Series A round, led by Dell Technologies Capital with the participation of seed investors Hyperwise Ventures and StageOne …