Don’t miss

Tietoevry ransomware attack halts Swedish organizations

Tietoevry ransomware attack halts Swedish organizations 2024-01-22 at 13:16 By Helga Labus Finnish IT software and service company Tietoevry has suffered a ransomware attack that affected several customers of one of its datacenters in Sweden. The attack The ransomware attack took place during the night of January 19-20. “The attack was limited to one part […]

React to this headline:

Loading spinner

Tietoevry ransomware attack halts Swedish organizations Read More »

New method to safeguard against mobile account takeovers

New method to safeguard against mobile account takeovers 2024-01-22 at 13:01 By Help Net Security Computer science researchers have developed a new way to identify security weaknesses that leave people vulnerable to account takeover attacks, where an attacker gains unauthorized access to online accounts. Most mobiles are now home to a complex ecosystem of interconnected

React to this headline:

Loading spinner

New method to safeguard against mobile account takeovers Read More »

Without clear guidance, SEC’s new rule on incident reporting may be detrimental

Without clear guidance, SEC’s new rule on incident reporting may be detrimental 2024-01-22 at 08:01 By Help Net Security The SEC has instituted a set of guidelines “requiring registrants to disclose material cybersecurity incidents they experience and to disclose on an annual basis material information regarding their cybersecurity risk management, strategy, and governance.” These new

React to this headline:

Loading spinner

Without clear guidance, SEC’s new rule on incident reporting may be detrimental Read More »

The reality of hacking threats in connected car systems

The reality of hacking threats in connected car systems 2024-01-22 at 07:31 By Mirko Zorz With the integration of sophisticated technologies like over-the-air updates and increased data connectivity, cars are no longer just modes of transportation but also hubs of personal and operational data. This shift brings forth unique cybersecurity challenges, ranging from hacking and

React to this headline:

Loading spinner

The reality of hacking threats in connected car systems Read More »

Ivanti EPMM and MobileIron Core vulnerability is actively exploited, CISA confirms (CVE-2023-35082)

Ivanti EPMM and MobileIron Core vulnerability is actively exploited, CISA confirms (CVE-2023-35082) 2024-01-19 at 19:49 By Zeljka Zorz A previously patched critical vulnerability (CVE-2023-35082) affecting Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core is being actively exploited, the Cybersecurity and Infrastructure Security Agency (CISA) has confirmed by adding the vulnerability to its Known Exploited Vulnerabilities

React to this headline:

Loading spinner

Ivanti EPMM and MobileIron Core vulnerability is actively exploited, CISA confirms (CVE-2023-35082) Read More »

Out with the old and in with the improved: MFA needs a revamp

Out with the old and in with the improved: MFA needs a revamp 2024-01-19 at 08:02 By Help Net Security From AI to ZTA (zero-trust architecture), the technology responsible for protecting your company’s data has evolved immensely. Despite the advances, cybercriminals repeatedly find new and creative ways to gain access to sensitive information. This can

React to this headline:

Loading spinner

Out with the old and in with the improved: MFA needs a revamp Read More »

Poorly secured PostgreSQL, MySQL servers targeted by ransomware bot

Poorly secured PostgreSQL, MySQL servers targeted by ransomware bot 2024-01-18 at 17:03 By Zeljka Zorz Users exposing poorly secured PostgreSQL and MySQL servers online are in danger of getting their databases wiped by a ransomware bot, Border0 researchers are warning. The attackers asks for a small sum to return / not publish the data, but

React to this headline:

Loading spinner

Poorly secured PostgreSQL, MySQL servers targeted by ransomware bot Read More »

VMware: Plug critical Aria Automation hole immediately! (CVE-2023-34063)

VMware: Plug critical Aria Automation hole immediately! (CVE-2023-34063) 2024-01-18 at 12:16 By Zeljka Zorz A critical vulnerability (CVE-2023-34063) affecting VMware Aria Automation and VMware Cloud Foundation can be exploited by attackers to gain access to remote organizations and workflows, VMware has warned. The company is not aware of any “in the wild” exploitation of this

React to this headline:

Loading spinner

VMware: Plug critical Aria Automation hole immediately! (CVE-2023-34063) Read More »

Attribute-based encryption could spell the end of data compromise

Attribute-based encryption could spell the end of data compromise 2024-01-18 at 08:02 By Help Net Security The future of data privacy is the end of compromise. With the world producing data at astounding rates, we need ways to put data to the best use while protecting against breaches and ensuring privacy, data protection and access

React to this headline:

Loading spinner

Attribute-based encryption could spell the end of data compromise Read More »

Skytrack: Open-source aircraft reconnaissance tool

Skytrack: Open-source aircraft reconnaissance tool 2024-01-18 at 07:31 By Mirko Zorz Skytrack is an open-source command-line tool for plane spotting and aircraft OSINT reconnaissance. The tool utilizes multiple data sources to collect information on aircraft, can produce a PDF report for a specific aircraft, and offers conversion between ICAO and Tail Number designations. Suitable for

React to this headline:

Loading spinner

Skytrack: Open-source aircraft reconnaissance tool Read More »

Ransomware negotiation: When cybersecurity meets crisis management

Ransomware negotiation: When cybersecurity meets crisis management 2024-01-18 at 07:01 By Mirko Zorz In this Help Net Security interview, Tim Morris, Chief Security Advisor at Tanium, discusses ransomware negotiation, how it typically unfolds, and how organizations should have a playbook that clearly outlines what to do, when to do it, who is notified, who will

React to this headline:

Loading spinner

Ransomware negotiation: When cybersecurity meets crisis management Read More »

The power of AI in cybersecurity

The power of AI in cybersecurity 2024-01-18 at 06:31 By Helga Labus The widespread adoption of artificial intelligence (AI), particularly generative AI (GenAI), has revolutionized organizational landscapes and transformed both the cyber threat landscape and cybersecurity. AI as a powerful cybersecurity tool As organizations handle increasing amounts of data daily, AI offers advanced capabilities that

React to this headline:

Loading spinner

The power of AI in cybersecurity Read More »

Kaspersky releases utility to detect iOS spyware infections

Kaspersky releases utility to detect iOS spyware infections 2024-01-17 at 13:46 By Help Net Security Kaspersky’s researchers have developed a lightweight method to detect indicators of infection from sophisticated iOS spyware such as NSO Group’s Pegasus, QuaDream’s Reign, and Intellexa’s Predator through analyzing a log file created on iOS devices. Analyzing the Shutdown.log The company’s

React to this headline:

Loading spinner

Kaspersky releases utility to detect iOS spyware infections Read More »

Google fixes actively exploited Chrome zero-day (CVE-2024-0519)

Google fixes actively exploited Chrome zero-day (CVE-2024-0519) 2024-01-17 at 12:01 By Zeljka Zorz In the new stable release of the Chrome browser, Google has fixed three security vulnerabilities affecting the V8 engine, including one zero-day (CVE-2024-0519) with an existing exploit. About CVE-2024-0519 V8 is an open-source JavaScript and WebAssembly engine developed by the Chromium Project

React to this headline:

Loading spinner

Google fixes actively exploited Chrome zero-day (CVE-2024-0519) Read More »

Security considerations during layoffs: Advice from an MSSP

Security considerations during layoffs: Advice from an MSSP 2024-01-17 at 08:01 By Help Net Security Navigating layoffs is complex and difficult for many reasons. Not only do human resources and direct managers bear the onus of responsibility when conducting exit conversations, but security teams should also make the necessary preparations for monitoring anomalies in employee

React to this headline:

Loading spinner

Security considerations during layoffs: Advice from an MSSP Read More »

The right strategy for effective cybersecurity awareness

The right strategy for effective cybersecurity awareness 2024-01-17 at 07:31 By Helga Labus Employees play a significant role in safeguarding organizational assets. With a constantly evolving threat landscape, cybersecurity awareness training is an essential component in creating a good security culture. Why cybersecurity awareness training? 81% of organizations were hit by malware, phishing, and password

React to this headline:

Loading spinner

The right strategy for effective cybersecurity awareness Read More »

CISOs’ crucial role in aligning security goals with enterprise expectations

CISOs’ crucial role in aligning security goals with enterprise expectations 2024-01-17 at 07:01 By Mirko Zorz In this Help Net Security interview, Chris Mixter, Vice President, Analyst at Gartner, discusses the dynamic world of CISOs and how their roles have evolved significantly over the years. He outlines the critical skills for CISOs in 2024, addresses

React to this headline:

Loading spinner

CISOs’ crucial role in aligning security goals with enterprise expectations Read More »

Best practices to mitigate alert fatigue

Best practices to mitigate alert fatigue 2024-01-17 at 06:32 By Help Net Security In this Help Net Security video, Peter Manev, Chief Strategy Officer at Stamus Networks, discusses a pervasive problem plaguing security analysts called “alert fatigue,” – which occurs when security teams become desensitized to an overwhelming volume of alerts, causing them to miss

React to this headline:

Loading spinner

Best practices to mitigate alert fatigue Read More »

Atlassian reveals critical Confluence RCE flaw, urges “immediate action” (CVE-2023-22527)

Atlassian reveals critical Confluence RCE flaw, urges “immediate action” (CVE-2023-22527) 2024-01-16 at 19:46 By Zeljka Zorz Atlassian has patched a critical vulnerability (CVE-2023-22527) in Confluence Data Center and Confluence Server that could lead to remote code execution. The good news is that the flaw was fixed in early December 2023 with the release of versions

React to this headline:

Loading spinner

Atlassian reveals critical Confluence RCE flaw, urges “immediate action” (CVE-2023-22527) Read More »

1,700 Ivanti VPN devices compromised. Are yours among them?

1,700 Ivanti VPN devices compromised. Are yours among them? 2024-01-16 at 17:16 By Zeljka Zorz Over 1,700 Ivanti Connect Secure VPN devices worldwide have been compromised by attackers exploiting two zero-days with no patches currently available. “Additional threat actors beyond UTA0178 appear to now have access to the exploit and are actively trying to exploit

React to this headline:

Loading spinner

1,700 Ivanti VPN devices compromised. Are yours among them? Read More »

Scroll to Top