Don’t miss

How threats to mid-sized businesses impact us all

How threats to mid-sized businesses impact us all 15/08/2023 at 07:06 By Help Net Security In this Help Net Security video, Paul Cragg, CTO at NormCyber, discusses how organizations grapple with many cyber threats. For smaller in-house IT teams, distinguishing between minor events and genuine threats becomes an overwhelming challenge since even a single overlooked […]

React to this headline:

Loading spinner

How threats to mid-sized businesses impact us all Read More »

6 free artificial intelligence TED Talks you can watch right now

6 free artificial intelligence TED Talks you can watch right now 15/08/2023 at 06:38 By Help Net Security Artificial intelligence (AI) is no longer a fragment of futuristic imagination – it’s redefining the fabric of our daily experiences and corporate strategies. The world’s tech giants are making assertive strides in AI. The TED Talks listed

React to this headline:

Loading spinner

6 free artificial intelligence TED Talks you can watch right now Read More »

Almost all VPNs are vulnerable to traffic-leaking TunnelCrack attacks

Almost all VPNs are vulnerable to traffic-leaking TunnelCrack attacks 14/08/2023 at 16:47 By Zeljka Zorz Several vulnerabilities that affect most VPN products out there can be exploited by attackers to read user traffic, steal user information, or even attack user devices, researchers have discovered. “Our attacks are not computationally expensive, meaning anyone with the appropriate

React to this headline:

Loading spinner

Almost all VPNs are vulnerable to traffic-leaking TunnelCrack attacks Read More »

Macs are getting compromised to act as proxy exit nodes

Macs are getting compromised to act as proxy exit nodes 14/08/2023 at 14:01 By Zeljka Zorz AdLoad, well-known malware that has been targeting systems running macOS for over half a decade, has been observed delivering a new payload that – unbeknown to the owners – enlisted their systems into a residential proxy botnet. According to

React to this headline:

Loading spinner

Macs are getting compromised to act as proxy exit nodes Read More »

Major vulnerabilities discovered in data center solutions

Major vulnerabilities discovered in data center solutions 14/08/2023 at 13:17 By Helga Labus Researchers have discovered serious security vulnerabilities in two widely used data center solutions: CyberPower’s PowerPanel Enterprise Data Center Infrastructure Management (DCIM) platform and Dataprobe’s iBoot Power Distribution Unit (PDU). “An attacker could chain these vulnerabilities together to gain full access to these

React to this headline:

Loading spinner

Major vulnerabilities discovered in data center solutions Read More »

APTs use of lesser-known TTPs are no less of a headache

APTs use of lesser-known TTPs are no less of a headache 14/08/2023 at 08:32 By Help Net Security APT (advanced persistent threat) attacks were once considered to be primarily a problem for large corporations, but the number of these (often state-sponsored) attacks against small- and medium-sized businesses has increased significantly. Everyone is fair game, and

React to this headline:

Loading spinner

APTs use of lesser-known TTPs are no less of a headache Read More »

Deception technology and breach anticipation strategies

Deception technology and breach anticipation strategies 14/08/2023 at 08:02 By Mirko Zorz Cybersecurity is undergoing a paradigm shift. Previously, defenses were built on the assumption of keeping adversaries out; now, strategies are formed with the idea that they might already be within the network. This modern approach has given rise to advanced methods prioritizing rapid

React to this headline:

Loading spinner

Deception technology and breach anticipation strategies Read More »

How manufacturers can navigate cybersecurity regulations amid NIST 2.0

How manufacturers can navigate cybersecurity regulations amid NIST 2.0 14/08/2023 at 07:31 By Help Net Security The National Institute of Standards and Technology (NIST) released a discussion draft for possible Cybersecurity Framework (CSF) changes earlier this year. The proposed changes aim to help increase the CSF’s clarity and bring the updated version closer to national

React to this headline:

Loading spinner

How manufacturers can navigate cybersecurity regulations amid NIST 2.0 Read More »

Product showcase: Free email security test by ImmuniWeb Community Edition

Product showcase: Free email security test by ImmuniWeb Community Edition 14/08/2023 at 07:03 By Help Net Security According to an FBI report, in 2022, global losses from business email compromise (BEC) and email account compromise (EAC) attacks attained $43 billion, hitting a historic anti-record. Multiple cybersecurity vendors, including Microsoft and Trend Micro, reported a rapid

React to this headline:

Loading spinner

Product showcase: Free email security test by ImmuniWeb Community Edition Read More »

Black Hat USA 2023 video walkthrough

Black Hat USA 2023 video walkthrough 11/08/2023 at 15:04 By Help Net Security Help Net Security is in Las Vegas this week for Black Hat USA 2023, and this video provides a closer look at the event. The exhibitors featured in this video are: 1Password, Aqua Security, CISA, Cisco, CyberFOX, Darktrace, Dasera, Fortanix, Fortinet, Fortra,

React to this headline:

Loading spinner

Black Hat USA 2023 video walkthrough Read More »

How to handle API sprawl and the security threat it poses

How to handle API sprawl and the security threat it poses 11/08/2023 at 08:34 By Help Net Security The proliferation of APIs has marked them as prime targets for malicious attackers. With recent reports indicating that API vulnerabilities are costing businesses billions of dollars annually, it’s no wonder they are at the top of mind

React to this headline:

Loading spinner

How to handle API sprawl and the security threat it poses Read More »

Photos: Black Hat USA 2023

Photos: Black Hat USA 2023 11/08/2023 at 07:47 By Help Net Security Black Hat USA 2023 returned to the Mandalay Bay Convention Center in Las Vegas. The conference featured over 100 selected Briefings, open-source tool demos in the Arsenal, a Business Hall, networking events, and more. Here’s a photo gallery from the event. The featured

React to this headline:

Loading spinner

Photos: Black Hat USA 2023 Read More »

How digital content security stays resilient amid evolving threats

How digital content security stays resilient amid evolving threats 11/08/2023 at 07:32 By Mirko Zorz With threats evolving and multiplying, it’s essential to understand how technological advancements can serve as both a challenge and an opportunity to safeguard digital content. In this Help Net Security interview, Rusty Cumpston, CEO at RKVST, discusses blockchain’s role in

React to this headline:

Loading spinner

How digital content security stays resilient amid evolving threats Read More »

How to accelerate and access DDoS protection services using GRE

How to accelerate and access DDoS protection services using GRE 11/08/2023 at 06:31 By Help Net Security As we entered 2023, the cybersecurity landscape witnessed an increase in sophisticated, high-volume attacks, according to Gcore. The maximum attack power rose from 600 to 800 Gbps. UDP flood attacks were most common and amounted to 52% of

React to this headline:

Loading spinner

How to accelerate and access DDoS protection services using GRE Read More »

Will AI kill cybersecurity jobs?

Will AI kill cybersecurity jobs? 10/08/2023 at 07:35 By Help Net Security Some ten years ago, the authors of The Second Machine Age wrote that “computers and other digital advances are doing for mental power—the ability to use our brains to understand and shape our environments—what the steam engine and its descendants did for muscle

React to this headline:

Loading spinner

Will AI kill cybersecurity jobs? Read More »

Learning from past healthcare breaches to fortify future cybersecurity strategies

Learning from past healthcare breaches to fortify future cybersecurity strategies 10/08/2023 at 07:02 By Help Net Security In the face of rising cyber threats, the healthcare sector has become a hotbed for cyberattacks. Given the gravity of this situation, we sat down with Shenny Sheth, Deputy CISO at Centura Health, who sheds light on the

React to this headline:

Loading spinner

Learning from past healthcare breaches to fortify future cybersecurity strategies Read More »

What to know about FedRAMP Rev. 5 Baselines

What to know about FedRAMP Rev. 5 Baselines 10/08/2023 at 06:31 By Help Net Security In this Help Net Security video, Kaus Phaltankar, CEO at Caveonix, discusses how the recent approval of the FedRAMP Rev. 5 Baselines is a significant step forward in the cloud security and compliance domain. The implications for CSPs and third-party

React to this headline:

Loading spinner

What to know about FedRAMP Rev. 5 Baselines Read More »

Google unveils stronger cellular security for Android 14

Google unveils stronger cellular security for Android 14 09/08/2023 at 13:49 By Helga Labus Google has revealed new cellular security mitigations that will be available for users and enterprises on its soon-to-be-released Android 14, and announced a new release schedule for Chrome Stable channel updates. Boosting network security on Android 14 Even though 2G service

React to this headline:

Loading spinner

Google unveils stronger cellular security for Android 14 Read More »

Downfall attacks can gather passwords, encryption keys from Intel processors

Downfall attacks can gather passwords, encryption keys from Intel processors 09/08/2023 at 13:02 By Zeljka Zorz A variety of Intel Core processors and the devices using them are vulnerable to “Downfall”, a new class of attacks made possible by CVE-2022-40982, which enables attackers to access and steal sensitive data such as passwords, encryption keys, and

React to this headline:

Loading spinner

Downfall attacks can gather passwords, encryption keys from Intel processors Read More »

Scroll to Top