Don’t miss

The magic formula for big data companies to outshine the competition

The magic formula for big data companies to outshine the competition 28/06/2023 at 07:02 By Help Net Security In today’s data-driven world, organizations that can harness the power of big data and derive actionable insights are positioned to succeed. However, the sheer number of big data companies vying for attention has made it crucial for […]

React to this headline:

Loading spinner

The magic formula for big data companies to outshine the competition Read More »

How cyber insurance empowers CISOs

How cyber insurance empowers CISOs 27/06/2023 at 07:03 By Help Net Security In this Help Net Security video, Fawaz Rasheed, Field CISO at VMware, discusses how cyber insurance remains the high tide that rises ships. For organizations choosing to purchase cyber insurance, the requirements set forth towards them are beneficial in advancing their security program.

React to this headline:

Loading spinner

How cyber insurance empowers CISOs Read More »

MOVEit compromise affects pension systems, insurers

MOVEit compromise affects pension systems, insurers 26/06/2023 at 14:32 By Helga Labus The compromise of PBI Research and The Berwyn Group’s MOVEit installation has resulted in the theft of data belonging to several pension systems and insurance companies – and millions of their users. PBI + Berwyn Group – a population management provider – was

React to this headline:

Loading spinner

MOVEit compromise affects pension systems, insurers Read More »

Exploring the persistent threat of cyberattacks on healthcare

Exploring the persistent threat of cyberattacks on healthcare 26/06/2023 at 07:38 By Mirko Zorz In this Help Net Security interview, Brett Harris, Cybersecurity Officer for the Americas at Siemens Healthineers, discusses the long-term impacts of cyberattacks on healthcare institutions and what healthcare providers can do to protect patients’ personal data and medical devices. Can you

React to this headline:

Loading spinner

Exploring the persistent threat of cyberattacks on healthcare Read More »

How hardening Microsoft 365 tenants mitigates potential cloud attacks

How hardening Microsoft 365 tenants mitigates potential cloud attacks 26/06/2023 at 07:01 By Help Net Security Moving critical data and workloads to the cloud has significantly changed information security teams. But most don’t have the resources to be successful in their cloud attack modeling—not to mention the deployment of measurable controls to defend against these

React to this headline:

Loading spinner

How hardening Microsoft 365 tenants mitigates potential cloud attacks Read More »

5 free online cybersecurity courses you should check out

5 free online cybersecurity courses you should check out 26/06/2023 at 06:30 By Help Net Security Cryptography In this course, you’ll learn how to protect information to ensure its integrity, confidentiality, authenticity, and non-repudiation. You will develop a basic understanding of cryptographic concepts and how to apply them, implement secure protocols, key management concepts, critical

React to this headline:

Loading spinner

5 free online cybersecurity courses you should check out Read More »

Uncovering attacker tactics through cloud honeypots

Uncovering attacker tactics through cloud honeypots 26/06/2023 at 06:12 By Help Net Security Attackers typically find exposed “secrets” – pieces of sensitive information that allow access to an enterprise cloud environment — in as little as two minutes and, in many cases, begin exploiting them almost instantly, highlighting the urgent need for comprehensive cloud security,

React to this headline:

Loading spinner

Uncovering attacker tactics through cloud honeypots Read More »

PoC exploit released for Cisco AnyConnect, Secure Client vulnerability (CVE-2023-20178)

PoC exploit released for Cisco AnyConnect, Secure Client vulnerability (CVE-2023-20178) 23/06/2023 at 17:19 By Helga Labus Proof-of-concept (PoC) exploit code for the high-severity vulnerability (CVE-2023-20178) in Cisco Secure Client Software for Windows and Cisco AnyConnect Secure Mobility Client Software for Windows has been published. About the vulnerability Cisco Secure Client Software – previously known as

React to this headline:

Loading spinner

PoC exploit released for Cisco AnyConnect, Secure Client vulnerability (CVE-2023-20178) Read More »

Microsoft Teams vulnerability allows attackers to deliver malware to employees

Microsoft Teams vulnerability allows attackers to deliver malware to employees 23/06/2023 at 15:24 By Zeljka Zorz Security researchers have uncovered a bug that could allow attackers to deliver malware directly into employees’ Microsoft Teams inbox. “Organisations that use Microsoft Teams inherit Microsoft’s default configuration which allows users from outside of their organisation to reach out

React to this headline:

Loading spinner

Microsoft Teams vulnerability allows attackers to deliver malware to employees Read More »

Operationalizing zero trust in the cloud

Operationalizing zero trust in the cloud 23/06/2023 at 07:39 By Help Net Security Some organizations have bought into the idea that workloads in the cloud are inherently more secure than those on premises. This idea is reinforced by the concept that the cloud service provider (CSP) assumes responsibility for security. However, while a secure cloud

React to this headline:

Loading spinner

Operationalizing zero trust in the cloud Read More »

Security investments that help companies navigate the macroeconomic climate

Security investments that help companies navigate the macroeconomic climate 23/06/2023 at 07:01 By Help Net Security As data transformation progresses, cyber attacks are among the most significant growing threats to the enterprise. As seen in the recent MOVEit situation, enterprises must immediately enact cybersecurity solutions that are right for them. Every enterprise is unique, so

React to this headline:

Loading spinner

Security investments that help companies navigate the macroeconomic climate Read More »

Apple fixes zero-day vulnerabilities used to covertly deliver spyware (CVE-2023-32435)

Apple fixes zero-day vulnerabilities used to covertly deliver spyware (CVE-2023-32435) 22/06/2023 at 13:36 By Zeljka Zorz Apple has released patches for three zero-day vulnerabilities (CVE-2023-32434, CVE-2023-32435, CVE-2023-32439) exploited in the wild. The first two have been reported by Kaspersky researchers Georgy Kucherin, Leonid Bezvershenko and Boris Larin following their discovery of the iOS spyware implant

React to this headline:

Loading spinner

Apple fixes zero-day vulnerabilities used to covertly deliver spyware (CVE-2023-32435) Read More »

ChatGPT shows promise in detecting phishing sites

ChatGPT shows promise in detecting phishing sites 22/06/2023 at 08:24 By Helga Labus ChatGPT can be used to generate phishing sites, but could it also be used to reliably detect them? Security researchers have tried to answer that question. Can ChatGPT detect phishing sites based on URLs? Kaspersky researchers tested 5,265 (2322 phishing and 2943

React to this headline:

Loading spinner

ChatGPT shows promise in detecting phishing sites Read More »

Cloud-native security hinges on open source

Cloud-native security hinges on open source 22/06/2023 at 07:33 By Help Net Security Technologies like Kubernetes and K3S are synonymous with the success of cloud native computing and the power of open source. It is no accident they have steamrolled the competition. As enterprises look to secure cloud-native environments, open source is the critical piece

React to this headline:

Loading spinner

Cloud-native security hinges on open source Read More »

Understanding the interplay between DevOps productivity and security

Understanding the interplay between DevOps productivity and security 22/06/2023 at 07:09 By Help Net Security Not only are macroeconomic headwinds causing more significant stress for security and DevOps teams, but the increasing number of threats against shrinking teams is causing an uneven playing field. In this Help Net Security video, Ev Kontsevoy, CEO at Teleport,

React to this headline:

Loading spinner

Understanding the interplay between DevOps productivity and security Read More »

Unraveling the multifaceted threats facing telecom companies

Unraveling the multifaceted threats facing telecom companies 22/06/2023 at 07:09 By Mirko Zorz In today’s interconnected world, telecom companies serve as gateways, connecting individuals, businesses, and governments. However, this role also makes them prime targets for cyberattacks. From DDoS attacks to sophisticated spyware infiltration, telecom providers face a wide range of threats that can disrupt

React to this headline:

Loading spinner

Unraveling the multifaceted threats facing telecom companies Read More »

VMware Aria Operations for Networks vulnerability exploited in the wild (CVE-2023-20887)

VMware Aria Operations for Networks vulnerability exploited in the wild (CVE-2023-20887) 21/06/2023 at 11:42 By Zeljka Zorz CVE-2023-20887, a pre-authentication command injection vulnerability in VMware Aria Operations for Networks (formerly vRealize Network Insight), has been spotted being exploited in the wild. There are no workarounds to mitigate the risk of exploitation – enterprise admins are

React to this headline:

Loading spinner

VMware Aria Operations for Networks vulnerability exploited in the wild (CVE-2023-20887) Read More »

Infosecurity Europe 2023 video walkthrough

Infosecurity Europe 2023 video walkthrough 21/06/2023 at 11:24 By Help Net Security Infosecurity Europe 2023 is taking place in London this week, and this video provides a closer look at this year’s event. The post Infosecurity Europe 2023 video walkthrough appeared first on Help Net Security. This article is an excerpt from Help Net Security

React to this headline:

Loading spinner

Infosecurity Europe 2023 video walkthrough Read More »

Compromised ChatGPT accounts garner rapid dark web popularity

Compromised ChatGPT accounts garner rapid dark web popularity 21/06/2023 at 09:06 By Help Net Security Compromised credentials were found within the logs of info-stealing malware traded on illicit dark web marketplaces over the past year, according to Group-IB. The number of available logs containing compromised ChatGPT accounts reached a peak of 26,802 in May 2023.

React to this headline:

Loading spinner

Compromised ChatGPT accounts garner rapid dark web popularity Read More »

How to create SBOMs for container images

How to create SBOMs for container images 21/06/2023 at 09:06 By Help Net Security The importance of software bills of materials (SBOMs) has grown substantially in recent years as organizations recognize the need for greater transparency in the software supply chain. This focus on SBOMs is a response to increasing cybersecurity threats and legislative efforts

React to this headline:

Loading spinner

How to create SBOMs for container images Read More »

Scroll to Top