Don’t miss

Unpacking the challenges of AI cybersecurity

Unpacking the challenges of AI cybersecurity 2024-02-01 at 06:31 By Help Net Security As organizations handle increasing amounts of data daily, AI offers advanced capabilities that would be harder to achieve with traditional methods. In this Help Net Security video, Tyler Young, CISO at BigID, explores AI’s challenges, triumphs, and future in cybersecurity. The post […]

React to this headline:

Loading spinner

Unpacking the challenges of AI cybersecurity Read More »

A zero-day vulnerability (and PoC) to blind defenses relying on Windows event logs

A zero-day vulnerability (and PoC) to blind defenses relying on Windows event logs 2024-01-31 at 18:31 By Zeljka Zorz A zero-day vulnerability that, when triggered, could crash the Windows Event Log service on all supported (and some legacy) versions of Windows could spell trouble for enterprise defenders. Discovered by a security researcher named Florian and

React to this headline:

Loading spinner

A zero-day vulnerability (and PoC) to blind defenses relying on Windows event logs Read More »

Free ransomware recovery tool White Phoenix now has a web version

Free ransomware recovery tool White Phoenix now has a web version 2024-01-31 at 10:17 By Help Net Security White Phoenix is a free ransomware recovery tool for situations where files are encrypted with intermittent encryption. It was tested on BlackCat/ALPHV Ransomware, Play Ransomware, Qilin/Agenda Ransomware, BianLian Ransomware, and DarkBit. Intermittent encryption occurs when ransomware chooses

React to this headline:

Loading spinner

Free ransomware recovery tool White Phoenix now has a web version Read More »

Does CVSS 4.0 solve the exploitability problem?

Does CVSS 4.0 solve the exploitability problem? 2024-01-31 at 08:03 By Help Net Security The newest version of the vulnerability scoring system CVSS 4.0 is here! After a lengthy gap between version 3 (released in 2015), as of November 2023 version 4.0 is officially live. Building iteratively on version 3 there are a few differences

React to this headline:

Loading spinner

Does CVSS 4.0 solve the exploitability problem? Read More »

Proactive cybersecurity: A strategic approach to cost efficiency and crisis management

Proactive cybersecurity: A strategic approach to cost efficiency and crisis management 2024-01-31 at 07:31 By Mirko Zorz In this Help Net Security interview, Stephanie Hagopian, VP of Security at CDW, discusses offensive strategies in the face of complex cyberattacks and the role of the zero-trust model. The conversation also covers the essential steps for a

React to this headline:

Loading spinner

Proactive cybersecurity: A strategic approach to cost efficiency and crisis management Read More »

How to make developers accept DevSecOps

How to make developers accept DevSecOps 2024-01-31 at 07:05 By Helga Labus According to a recent Dynatrace report, only 50% of CISOs believe that development teams have thoroughly tested the software for vulnerabilities before deploying it into the production environment. This is a statistic that needs to change and the only way to change it

React to this headline:

Loading spinner

How to make developers accept DevSecOps Read More »

Self-managed GitLab installations should be patched again (CVE-2024-0402)

Self-managed GitLab installations should be patched again (CVE-2024-0402) 2024-01-30 at 14:02 By Zeljka Zorz Less than two weeks after having plugged a security hole that allows account takeover without user interaction, GitLab Inc. has patched a critical vulnerability (CVE-2024-0402) in GitLab CE/EE again and is urging users to update their installations immediately. GitLab Inc. operates

React to this headline:

Loading spinner

Self-managed GitLab installations should be patched again (CVE-2024-0402) Read More »

Great security or great UX? Both, please

Great security or great UX? Both, please 2024-01-30 at 08:02 By Help Net Security A new user is signing up for a SaaS application. On the one hand, UX teams want that user to get into the app as quickly as possible. On the other hand, security teams want the user to strongly validate their

React to this headline:

Loading spinner

Great security or great UX? Both, please Read More »

Faction: Open-source pentesting report generation and collaboration framework

Faction: Open-source pentesting report generation and collaboration framework 2024-01-30 at 07:31 By Mirko Zorz Faction is an open-source solution that enables pentesting report generation and assessment collaboration. Josh Summitt, the creator of Faction, has always disliked the process of writing reports, preferring to focus on uncovering bugs. A key frustration for him was the redundant

React to this headline:

Loading spinner

Faction: Open-source pentesting report generation and collaboration framework Read More »

Ransomware recap 2023 highlights cybersecurity crisis

Ransomware recap 2023 highlights cybersecurity crisis 2024-01-30 at 07:02 By Help Net Security In this Help Net Security video, Yochai Corem, CEO of Cyberint, explores the ransomware environment’s development, effects, and emerging patterns throughout the previous year. 2023 marked a historic high for ransomware groups, with a 55.5% increase in attacks, reaching 4,368 victims globally,

React to this headline:

Loading spinner

Ransomware recap 2023 highlights cybersecurity crisis Read More »

Critical Jenkins RCE flaw exploited in the wild. Patch now! (CVE-2024-23897)

Critical Jenkins RCE flaw exploited in the wild. Patch now! (CVE-2024-23897) 2024-01-29 at 13:31 By Helga Labus Several proof-of-concept (PoC) exploits for a recently patched critical vulnerability (CVE-2024-23897) in Jenkins has been made public and there’s evidence of exploitation in the wild. About CVE-2024-23897 Jenkins is a widely used Java-based open-source automation server that helps

React to this headline:

Loading spinner

Critical Jenkins RCE flaw exploited in the wild. Patch now! (CVE-2024-23897) Read More »

Third-party risk management best practices and why they matter

Third-party risk management best practices and why they matter 2024-01-29 at 08:01 By Helga Labus With organizations increasingly relying on third-party vendors, upping the third-party risk management (TPRM) game has become imperative to prevent the fallout of third-party compromises. Third-party risks SecurityScorecard recently found that 98% of organizations are connected with at least one third-party

React to this headline:

Loading spinner

Third-party risk management best practices and why they matter Read More »

Prioritizing cybercrime intelligence for effective decision-making in cybersecurity

Prioritizing cybercrime intelligence for effective decision-making in cybersecurity 2024-01-29 at 07:32 By Mirko Zorz In this Help Net Security interview, Alon Gal, CTO at Hudson Rock, discusses integrating cybercrime intelligence into existing security infrastructures. Our discussion will cover a range of essential aspects, from the importance of continuous adaptation in cybersecurity strategies to practical advice

React to this headline:

Loading spinner

Prioritizing cybercrime intelligence for effective decision-making in cybersecurity Read More »

What makes ransomware victims less likely to pay up?

What makes ransomware victims less likely to pay up? 2024-01-26 at 08:34 By Zeljka Zorz There’s a good reason why ransomware gangs started exfiltrating victims’ data instead of just encrypting it: those organizations pay more. University of Twente researcher Tom Meurs and his colleagues wanted to know which factors influence victims to pay the ransom

React to this headline:

Loading spinner

What makes ransomware victims less likely to pay up? Read More »

Emerging trends and strategies in digital forensics

Emerging trends and strategies in digital forensics 2024-01-26 at 07:01 By Mirko Zorz In this Help Net Security interview, Amber Schroader, CEO at Paraben Corporation, discusses the challenges posed by the complexity of modern computer systems and networks on digital evidence collection. Schroader talks about the impact of exponential data growth on forensic practices, the

React to this headline:

Loading spinner

Emerging trends and strategies in digital forensics Read More »

Russian hackers breached Microsoft, HPE corporate maliboxes

Russian hackers breached Microsoft, HPE corporate maliboxes 2024-01-25 at 15:31 By Helga Labus Cozy Bear (aka Midnight Blizzard, aka APT29) has been busy hacking and spying on big tech companies: both Microsoft and Hewlett Packard Enterprise (HPE) have recently disclosed successful attack campaigns by the Russia-affiliated APT group. The Microsoft breach Last Friday, Microsoft revealed

React to this headline:

Loading spinner

Russian hackers breached Microsoft, HPE corporate maliboxes Read More »

Blackwood APT delivers malware by hijacking legitimate software update requests

Blackwood APT delivers malware by hijacking legitimate software update requests 2024-01-25 at 13:32 By Help Net Security ESET researchers have discovered NSPX30, a sophisticated implant used by a new China-aligned APT group, which they dubbed Blackwood. Blackwood has carried out cyberespionage operations against individuals and companies from China, Japan, and the United Kingdom. It leverages

React to this headline:

Loading spinner

Blackwood APT delivers malware by hijacking legitimate software update requests Read More »

AI expected to increase volume, impact of cyberattacks

AI expected to increase volume, impact of cyberattacks 2024-01-25 at 12:16 By Helga Labus All types of cyber threat actor are already using artificial intelligence (AI) to varying degrees, UK National Cyber Security Centre’s analysts say, and predict that AI “will almost certainly increase the volume and heighten the impact of cyberattacks over the next

React to this headline:

Loading spinner

AI expected to increase volume, impact of cyberattacks Read More »

Fighting insider threats is tricky but essential work

Fighting insider threats is tricky but essential work 2024-01-25 at 08:01 By Helga Labus Business executives are worried about accidental internal staff error (71%) almost as much as they are worried about external threats (75%). But which of the two is a bigger threat to a company? External vs insider threats External threats can cause

React to this headline:

Loading spinner

Fighting insider threats is tricky but essential work Read More »

Automated Emulation: Open-source breach and attack simulation lab

Automated Emulation: Open-source breach and attack simulation lab 2024-01-25 at 07:31 By Mirko Zorz Automated Emulation is an open-source Terraform template designed to create a customizable, automated breach and attack simulation lab. The solution automatically constructs the following resources hosted on AWS: One Linux server deploying Caldera, Prelude Operator Headless, and VECTR One Windows Client

React to this headline:

Loading spinner

Automated Emulation: Open-source breach and attack simulation lab Read More »

Scroll to Top