Don’t miss

Thinking outside the code: How the hacker mindset drives innovation

Thinking outside the code: How the hacker mindset drives innovation 2024-04-17 at 08:01 By Mirko Zorz Keren Elazari is an internationally recognized security analyst, author, and researcher. Since 2000, Keren has worked with leading Israeli security firms, government organizations, innovative start-ups, and Fortune 500 companies. She is the founder of BSidesTLV and Leading Cyber Ladies […]

React to this headline:

Loading spinner

Thinking outside the code: How the hacker mindset drives innovation Read More »

Cybersecurity jobs available right now: April 17, 2024

Cybersecurity jobs available right now: April 17, 2024 2024-04-17 at 07:31 By Mirko Zorz Client Security Officer Unisys | USA | Remote – View job details The Client Security Officer (CSO) is part of Unisys account management team servicing its clients as cybersecurity representative alongside the Client Executive and the Client Delivery Executive. Cybersecurity Engineer

React to this headline:

Loading spinner

Cybersecurity jobs available right now: April 17, 2024 Read More »

Damn Vulnerable RESTaurant: Open-source API service designed for learning

Damn Vulnerable RESTaurant: Open-source API service designed for learning 2024-04-17 at 07:01 By Mirko Zorz Damn Vulnerable RESTaurant is an open-source project that allows developers to learn to identify and fix security vulnerabilities in their code through an interactive game. “I wanted to create a generic playground for ethical hackers, developers, and security engineers where

React to this headline:

Loading spinner

Damn Vulnerable RESTaurant: Open-source API service designed for learning Read More »

Understanding next-level cyber threats

Understanding next-level cyber threats 2024-04-17 at 06:31 By Help Net Security In this Help Net Security video, Trevor Hilligoss, VP of SpyCloud Labs, discusses the 2024 SpyCloud Identity Exposure Report, an annual report examining the latest trends in cybercrime and its impact. Researchers recaptured nearly 1.38 billion passwords circulating the darknet in 2023, an 81.5%

React to this headline:

Loading spinner

Understanding next-level cyber threats Read More »

PuTTY vulnerability can be exploited to recover private keys (CVE-2024-31497)

PuTTY vulnerability can be exploited to recover private keys (CVE-2024-31497) 2024-04-16 at 19:46 By Zeljka Zorz A vulnerability (CVE-2024-31497) in PuTTY, a popular SSH and Telnet client, could allow attackers to recover NIST P-521 client keys due to the “heavily biased” ECDSA nonces (random values used once), researchers have discovered. “To be more precise, the

React to this headline:

Loading spinner

PuTTY vulnerability can be exploited to recover private keys (CVE-2024-31497) Read More »

Cisco Duo provider breached, SMS MFA logs compromised

Cisco Duo provider breached, SMS MFA logs compromised 2024-04-16 at 18:31 By Zeljka Zorz Hackers have managed to compromise a telephony provider for Duo, the Cisco-owned company providing secure access solutions, and steal MFA (multi-factor authentication) SMS message logs of Duo customers. About the attack The unnamed provider – one of two that Duo uses

React to this headline:

Loading spinner

Cisco Duo provider breached, SMS MFA logs compromised Read More »

New open-source project takeover attacks spotted, stymied

New open-source project takeover attacks spotted, stymied 2024-04-16 at 16:16 By Zeljka Zorz The OpenJS Foundation has headed off a “credible takeover attempt” similar to the one that resulted in a backdoor getting included in the open-source XZ Utils package by someone who called themselves “Jia Tan”. This malicious maintainer achieved that coveted position after

React to this headline:

Loading spinner

New open-source project takeover attacks spotted, stymied Read More »

5 free red teaming resources to get you started

5 free red teaming resources to get you started 2024-04-16 at 07:32 By Help Net Security Red teaming is evaluating the effectiveness of your cybersecurity by eliminating defender bias and adopting an adversarial perspective within your organization. Tactics may include anything from social engineering to physical security breaches to simulate a real-world advanced persistent threat.

React to this headline:

Loading spinner

5 free red teaming resources to get you started Read More »

AI set to enhance cybersecurity roles, not replace them

AI set to enhance cybersecurity roles, not replace them 2024-04-16 at 07:02 By Mirko Zorz In this Help Net Security interview, Caleb Sima, Chair of CSA AI Security Alliance, discusses how AI empowers security pros, emphasizing its role in enhancing skills and productivity rather than replacing staff. AI is seen as empowering rather than replacing

React to this headline:

Loading spinner

AI set to enhance cybersecurity roles, not replace them Read More »

Audio deepfakes: What they are, and the risks they present

Audio deepfakes: What they are, and the risks they present 2024-04-16 at 06:31 By Help Net Security Audio deepfakes are becoming a big problem. Recent cybercriminal campaigns use voice cloning technology to replicate the speech tone and patterns of celebrities such as Elon Musk, Mr. Beast Tiger Woods, and others and use them for endorsing

React to this headline:

Loading spinner

Audio deepfakes: What they are, and the risks they present Read More »

A critical vulnerability in Delinea Secret Server allows auth bypass, admin access

A critical vulnerability in Delinea Secret Server allows auth bypass, admin access 2024-04-15 at 14:46 By Zeljka Zorz Organizations with on-prem installations of Delinea Secret Server are urged to update them immediately, to plug a critical vulnerability that may allow attackers to bypass authentication, gain admin access and extract secrets. Fixing the Delinea Secret Server

React to this headline:

Loading spinner

A critical vulnerability in Delinea Secret Server allows auth bypass, admin access Read More »

eBook: Why CISSP?

eBook: Why CISSP? 2024-04-15 at 14:16 By Help Net Security As new cyber threats emerge daily in our connected world, there’s never been a greater urgency for cybersecurity professionals than now. What can CISSP certification do for you? In the eBook, hear from cybersecurity experts on how certification: Gives you a seat at the table

React to this headline:

Loading spinner

eBook: Why CISSP? Read More »

How to protect IP surveillance cameras from Wi-Fi jamming

How to protect IP surveillance cameras from Wi-Fi jamming 2024-04-15 at 08:02 By Help Net Security Gone are the days of criminals cutting camera wires to evade detection: with the proliferation of affordable internet-connected cameras, burglars must resort to Wi-Fi jamming. Blocking the signal blinds the device and stalls home and business surveillance systems, which

React to this headline:

Loading spinner

How to protect IP surveillance cameras from Wi-Fi jamming Read More »

Geopolitical tensions escalate OT cyber attacks

Geopolitical tensions escalate OT cyber attacks 2024-04-15 at 07:31 By Mirko Zorz In this Help Net Security interview, Andrew Ginter, VP of Industrial Security at Waterfall Security, discusses operational technology (OT) cyber attacks and their 2024 Threat Report. He examines how global geopolitical tensions and evolving ransomware tactics are reshaping industrial cybersecurity. He sheds light

React to this headline:

Loading spinner

Geopolitical tensions escalate OT cyber attacks Read More »

Exposing the top cloud security threats

Exposing the top cloud security threats 2024-04-15 at 07:01 By Help Net Security Many companies consider AI-powered threats to be the top cloud security threat to their business. Concerningly, less than half are confident in their ability to tackle those threats, according to a recent Aqua Security survey. In this Help Net Security video, Michal

React to this headline:

Loading spinner

Exposing the top cloud security threats Read More »

Zarf: Open-source continuous software delivery on disconnected networks

Zarf: Open-source continuous software delivery on disconnected networks 2024-04-15 at 06:32 By Help Net Security Zarf is a free, open-source tool that enables continuous software delivery on disconnected networks. It currently offers fully automated support for K3s, K3d, and Kind and is also compatible with EKS, AKS, GKE, RKE2, and many other distro services. The

React to this headline:

Loading spinner

Zarf: Open-source continuous software delivery on disconnected networks Read More »

CVE-2024-3400 exploited: Unit 42, Volexity share more details about the attacks

CVE-2024-3400 exploited: Unit 42, Volexity share more details about the attacks 2024-04-12 at 22:16 By Zeljka Zorz Earlier today, Palo Alto Networks revealed that a critical command injection vulnerability (CVE-2024-3400) in the company’s firewalls has been exploited in limited attacks and has urged customers with vulnerable devices to quickly implement mitigations and workarounds. Palo Alto

React to this headline:

Loading spinner

CVE-2024-3400 exploited: Unit 42, Volexity share more details about the attacks Read More »

Palo Alto Networks firewalls under attack, hotfixes incoming! (CVE-2024-3400)

Palo Alto Networks firewalls under attack, hotfixes incoming! (CVE-2024-3400) 2024-04-12 at 10:46 By Zeljka Zorz Attackers are exploiting a command injection vulnerability (CVE-2024-3400) affecting Palo Alto Networks’ firewalls, the company has warned, and urged customers to implement temporary mitigations and get in touch to check whether their devices have been compromised. “Palo Alto Networks is

React to this headline:

Loading spinner

Palo Alto Networks firewalls under attack, hotfixes incoming! (CVE-2024-3400) Read More »

Strategies to cultivate collaboration between NetOps and SecOps

Strategies to cultivate collaboration between NetOps and SecOps 2024-04-12 at 07:31 By Mirko Zorz In this Help Net Security interview, Debby Briggs, CISO at Netscout, discusses breaking down silos between NetOps and SecOps. Practical steps include scheduling strategy meetings, understanding communication preferences, and fostering team collaboration. With evolving cloud models, collaboration and clear role assignments

React to this headline:

Loading spinner

Strategies to cultivate collaboration between NetOps and SecOps Read More »

The next wave of mobile threats

The next wave of mobile threats 2024-04-12 at 07:01 By Help Net Security According to McAfee, apps, whether for communication, productivity, or gaming, are among the biggest threats to mobile security. Technavio expects the global mobile security software market to grow by $2.75 billion between 2020 and 2025, expanding at a CAGR of 9.68%. In

React to this headline:

Loading spinner

The next wave of mobile threats Read More »

Scroll to Top