![HNS](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/10093706/hns-2023-large_logo-400x200.jpg)
Silobreaker integrates with DarkOwl for enhanced darknet credential monitoring
Silobreaker has integrated with DarkOwl for credential monitoring. The DarkOwl Credential Monitoring solution continuously checks for exposed credentials in darknet and …
![Cybertech Tel Aviv 2023](https://img.helpnetsecurity.com/wp-content/uploads/2023/01/31155456/cybertech-2023-telaviv2-400x200.jpg)
Photos: Cybertech Tel Aviv 2023, part 2
Help Net Security is attending the Cybertech Tel Aviv 2023 conference and exhibition, which gathers cybersecurity experts, businesses and startups from around the world. Here …
![security platform](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/20092552/security_platforma_1200-400x200.jpg)
DarkOwl Ransomware API offers insight into content from ransomware websites hosted on the darknet
DarkOwl released Ransomware API, the latest in their suite of darknet products. By enabling users to monitor darknet ransomware sites for their strategic assets – including …
Ontic and DarkOwl provide Fortune 500 clients with the ability to surface actionable insights from dark net data
Ontic announced a partnership with DarkOwl. The partnership provides Ontic Fortune 500 clients with the ability to surface actionable insights from dark net data through the …
![telehealth](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/17141716/doctor-laptop-telehealth-400x200.jpg)
Telehealth is healthcare industry’s biggest cybersecurity risk
While COVID-19 has proven the healthcare industry’s overall resilience, it has also increased its cybersecurity risk with new and emerging threats. The rapid adoption …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege