Don’t miss

Scammers exploit AI trend with fake ChatGPT apps on Google Play, Apple App Store

Scammers exploit AI trend with fake ChatGPT apps on Google Play, Apple App Store 17/05/2023 at 14:17 By Help Net Security Sophos researchers uncovered multiple apps masquerading as legitimate, ChatGPT-based chatbots to overcharge users. These apps have popped up in the Google Play and Apple App Store. Because the free versions have near-zero functionality and […]

React to this headline:

Loading spinner

Scammers exploit AI trend with fake ChatGPT apps on Google Play, Apple App Store Read More »

Preparing for federal supply chain security standardization

Preparing for federal supply chain security standardization 17/05/2023 at 09:42 By Help Net Security In 2021, the Biden Administration published the Executive Order on Improving the Nation’s Cybersecurity (EO 14028), setting off an agency-wide security initiative with the ultimate objective of standardizing security requirements across the Department of Defense (DoD) and the Federal Civilian Executive

React to this headline:

Loading spinner

Preparing for federal supply chain security standardization Read More »

Malicious open-source components threatening digital infrastructure

Malicious open-source components threatening digital infrastructure 17/05/2023 at 09:42 By Help Net Security A new risk emerges in the digital era, where open-source software has become a fundamental pillar in developing innovative applications. The threat? Malicious open-source components. In this Help Net Security video, Henrik Plate, Lead Security Researcher at Endor Labs, discusses the dual-edged

React to this headline:

Loading spinner

Malicious open-source components threatening digital infrastructure Read More »

Fraudsters send fake invoice, follow up with fake exec confirmation

Fraudsters send fake invoice, follow up with fake exec confirmation 16/05/2023 at 16:10 By Zeljka Zorz Fraudsters are trying out a new approach to convince companies to pay bogus invoices: instead of hijacking existing email threads, they are creating convincing ones themselves. A clever payment request fraud The fraud attempt begins with an email containing

React to this headline:

Loading spinner

Fraudsters send fake invoice, follow up with fake exec confirmation Read More »

Lacroix manufacturing facilities shut down following cyberattack

Lacroix manufacturing facilities shut down following cyberattack 16/05/2023 at 14:08 By Helga Labus French electronics manufacturer Lacroix closed three factories as a result of a cyberattack they “intercepted” over the weekend, the company has announced on Monday. Lacroix designs and produces electronic equipment for the automotive, home automation, aerospace, industrial and health sectors, as well

React to this headline:

Loading spinner

Lacroix manufacturing facilities shut down following cyberattack Read More »

WhatsApp allows users to lock sensitive chats

WhatsApp allows users to lock sensitive chats 16/05/2023 at 11:53 By Helga Labus Meta has unveiled Chat Lock within WhatsApp, a feature that allows users to keep sensitive and intimate conversations safe from prying eyes. WhatsApp Chat Lock (Source: WhatsApp) Enabling Chat Lock By tapping on a one-to-one or group conversation, users can easily enable

React to this headline:

Loading spinner

WhatsApp allows users to lock sensitive chats Read More »

New trends in ransomware attacks shape the future of cybersecurity

New trends in ransomware attacks shape the future of cybersecurity 16/05/2023 at 09:23 By Help Net Security Corvus Insurance analyzed data from the dark web and ransomware leak sites. Researchers uncovered a 60% increase in ransomware victims in March 2023, marking the highest monthly victim count observed in the past two years. In this Help

React to this headline:

Loading spinner

New trends in ransomware attacks shape the future of cybersecurity Read More »

3 tips to accelerate zero trust adoption

3 tips to accelerate zero trust adoption 16/05/2023 at 09:23 By Help Net Security Zero trust adoption is beginning to accelerate as networks get more complex. Gartner predicts that by 2026, 10% of large enterprises will have a comprehensive, mature, and measurable zero-trust program in place (compared to just 1% today). But adoption has been

React to this headline:

Loading spinner

3 tips to accelerate zero trust adoption Read More »

Advantech’s industrial serial device servers open to attack

Advantech’s industrial serial device servers open to attack 15/05/2023 at 17:48 By Zeljka Zorz Three vulnerabilities in Advantech’s EKI series of serial device servers could be exploited to execute arbitrary commands on the OS level. Source: CyberDanube The vulnerabilities Serial device servers are networking devices that “network-enable” serial devices (e.g., printer, climate control system, etc.)

React to this headline:

Loading spinner

Advantech’s industrial serial device servers open to attack Read More »

Is human threat hunting a fool’s errand?

Is human threat hunting a fool’s errand? 15/05/2023 at 12:11 By Help Net Security We all have witnessed automated advances creep into our modern threat hunting processes – and with good reason. As the rate of cyberattacks steadily increases, automated threat hunting processes are being integrated to help stem the tide by providing quicker security

React to this headline:

Loading spinner

Is human threat hunting a fool’s errand? Read More »

SquareX’s vision: A future where internet security is a non-issue

SquareX’s vision: A future where internet security is a non-issue 15/05/2023 at 12:11 By Mirko Zorz With an ever-evolving landscape of cyber threats, the necessity for innovative, effective, and user-friendly security products has never been more apparent. Current security solutions, however, seem to lag behind, struggling to adequately address the challenges posed by increasingly sophisticated

React to this headline:

Loading spinner

SquareX’s vision: A future where internet security is a non-issue Read More »

Web entity activity reveals insights into internet security

Web entity activity reveals insights into internet security 15/05/2023 at 08:13 By Help Net Security For its recent research focusing on web entities (or content served over HTTP), Censys leveraged its internet-wide scan data to understand better the applications and services that have become core to our existence, evaluating the state of security on the

React to this headline:

Loading spinner

Web entity activity reveals insights into internet security Read More »

Greatness phishing-as-a-service threatens Microsoft 365 users

Greatness phishing-as-a-service threatens Microsoft 365 users 12/05/2023 at 13:20 By Helga Labus Manufacturing businesses, healthcare organizations, and tech companies in English-speaking countries are the most targeted by phishers leveraging a relatively new phishing-as-a-service (PaaS) tool called Greatness, created to phish Microsoft 365 users. According to Cisco researcher, this tool has been utilized in numerous phishing

React to this headline:

Loading spinner

Greatness phishing-as-a-service threatens Microsoft 365 users Read More »

Top 3 trends shaping the future of cybersecurity and IAM

Top 3 trends shaping the future of cybersecurity and IAM 12/05/2023 at 07:30 By Help Net Security The need to protect sensitive information from unauthorized access and theft has never been greater, and cybersecurity and IAM technologies are evolving to meet this challenge while providing users with more convenience. There are three key trends to

React to this headline:

Loading spinner

Top 3 trends shaping the future of cybersecurity and IAM Read More »

Google notifies users about dark web exposure

Google notifies users about dark web exposure 11/05/2023 at 15:46 By Helga Labus Google has announced new tools, features and updates to improve users’ online safety, help them evaluate content found online, and alert them if their Gmail identity appears on the dark web. New tools and options for users A new tool called About

React to this headline:

Loading spinner

Google notifies users about dark web exposure Read More »

Dragos blocks ransomware attack, brushes aside extortion attempt

Dragos blocks ransomware attack, brushes aside extortion attempt 11/05/2023 at 15:46 By Zeljka Zorz A ransomware group has tried and failed to extort money from Dragos, the industrial cybersecurity firm has confirmed on Wednesday, and reassured that none of its systems or its Dragos Platform had been breached. What happened? “The criminal group gained access

React to this headline:

Loading spinner

Dragos blocks ransomware attack, brushes aside extortion attempt Read More »

CISOs confront mounting obstacles in tracking cyber assets

CISOs confront mounting obstacles in tracking cyber assets 11/05/2023 at 07:10 By Help Net Security Monitoring assets in ever-changing settings operating in both development and production stages presents challenges. In this Help Net Security video, Daniel Deeney, CEO at Paladin Cloud, discusses how companies face difficulties identifying security threats within cloud environments. As businesses transition

React to this headline:

Loading spinner

CISOs confront mounting obstacles in tracking cyber assets Read More »

Never leak secrets to your GitHub repositories again

Never leak secrets to your GitHub repositories again 10/05/2023 at 14:47 By Helga Labus GitHub is making push protection – a security feature designed to automatically prevent the leaking of secrets to repositories – free for owners of all public repositories. Previously, the feature was available only for private repositories with a GitHub Advanced Security

React to this headline:

Loading spinner

Never leak secrets to your GitHub repositories again Read More »

Turla’s Snake malware network disrupted by Five Eyes’ agencies

Turla’s Snake malware network disrupted by Five Eyes’ agencies 10/05/2023 at 14:47 By Help Net Security The US Justice Department announced the completion of court-authorized operation MEDUSA, to disrupt a global peer-to-peer network of computers compromised by sophisticated malware, called “Snake” (aka “Uroburous”), that the US Government attributes to a unit within Center 16 of

React to this headline:

Loading spinner

Turla’s Snake malware network disrupted by Five Eyes’ agencies Read More »

Prevent attackers from using legitimate tools against you

Prevent attackers from using legitimate tools against you 10/05/2023 at 07:21 By Help Net Security Malicious actors are increasingly exploiting legitimate tools to accomplish their goals, which include disabling security measures, lateral movement, and transferring files. Using commonly available tools allows attackers to evade detection. While custom-built tools or malware can be flagged as malicious

React to this headline:

Loading spinner

Prevent attackers from using legitimate tools against you Read More »

Scroll to Top