Hot stuff

Cyber professionals face an IP loss reckoning in 2025

Cyber professionals face an IP loss reckoning in 2025 2024-11-13 at 07:06 By Help Net Security AI can expose your work secrets. The same goes for AI-generated content, which has revolutionized workplace productivity but comes with hidden risks. As more employees use AI models to streamline tasks—whether drafting reports, building code, or designing products, they […]

React to this headline:

Loading spinner

Cyber professionals face an IP loss reckoning in 2025 Read More »

Tips for a successful cybersecurity job interview

Tips for a successful cybersecurity job interview 2024-11-13 at 06:35 By Anamarija Pogorelec Whether you’re looking to enhance your existing cybersecurity skills or just beginning your journey in the field, cybersecurity offers a wide range of career opportunities. If you’re considering a career shift, exploring new job opportunities, or aiming to upgrade your skill set,

React to this headline:

Loading spinner

Tips for a successful cybersecurity job interview Read More »

Microsoft fixes actively exploited zero-days (CVE-2024-43451, CVE-2024-49039)

Microsoft fixes actively exploited zero-days (CVE-2024-43451, CVE-2024-49039) 2024-11-12 at 23:03 By Zeljka Zorz November 2024 Patch Tuesday is here, and Microsoft has dropped fixes for 89 new security issues in its various products, two of which – CVE-2024-43451 and CVE-2024-49039 – are actively exploited by attackers. The exploited vulnerabilities (CVE-2024-43451, CVE-2024-49039) CVE-2024-43451 is yet another

React to this headline:

Loading spinner

Microsoft fixes actively exploited zero-days (CVE-2024-43451, CVE-2024-49039) Read More »

Massive troves of Amazon, HSBC employee data leaked

Massive troves of Amazon, HSBC employee data leaked 2024-11-12 at 12:18 By Zeljka Zorz A threat actor who goes by the online moniker “Nam3L3ss” has leaked employee data belonging to a number of corporations – including Amazon, 3M, HSBC and HP – ostensibly compromised during the May 2023 MOVEit hack by the Cl0p ransomware gang,

React to this headline:

Loading spinner

Massive troves of Amazon, HSBC employee data leaked Read More »

The changing face of identity security

The changing face of identity security 2024-11-12 at 08:03 By Help Net Security It’s easy to see why identity security is often synonymous with user security. Social engineering tactics are the mainstay of the threat actor’s arsenal, and it’s rare to find an attack that doesn’t feature them to some degree. Getting hold of privileged

React to this headline:

Loading spinner

The changing face of identity security Read More »

Evaluating your organization’s application risk management journey

Evaluating your organization’s application risk management journey 2024-11-12 at 07:33 By Mirko Zorz In this Help Net Security interview, Chris Wysopal, Chief Security Evangelist at Veracode, discusses strategies for CISOs to quantify application risk in financial terms. Wysopal outlines the need for continuous risk management practices and robust strategies to manage third-party software dependencies, ensuring

React to this headline:

Loading spinner

Evaluating your organization’s application risk management journey Read More »

Powerpipe: Open-source dashboards for DevOps

Powerpipe: Open-source dashboards for DevOps 2024-11-12 at 07:03 By Help Net Security Powerpipe is an open-source solution designed to streamline DevOps management with powerful visualization and compliance tools, making it simple to track, assess, and act on key data for smarter decision-making and continuous compliance monitoring. Dynamic dashboards and reports Powerpipe’s high-level dashboards offer an

React to this headline:

Loading spinner

Powerpipe: Open-source dashboards for DevOps Read More »

November 2024 Patch Tuesday forecast: New servers arrive early

November 2024 Patch Tuesday forecast: New servers arrive early 2024-11-11 at 08:03 By Help Net Security Microsoft followed their October precedent set with Windows 11 24H2 and announced Microsoft Server 2025 on the first of November. We were expecting the official announcement at Microsoft Ignite near the end of the month, but with the early

React to this headline:

Loading spinner

November 2024 Patch Tuesday forecast: New servers arrive early Read More »

4 reasons why veterans thrive as cybersecurity professionals

4 reasons why veterans thrive as cybersecurity professionals 2024-11-11 at 07:35 By Help Net Security Through their past military service, veterans are trained to think like adversaries, often share that mission-driven spirit and excel when working with a team to achieve a larger goal. They develop and champion the unique traits that cybersecurity companies need

React to this headline:

Loading spinner

4 reasons why veterans thrive as cybersecurity professionals Read More »

Strategies for CISOs navigating hybrid and multi-cloud security

Strategies for CISOs navigating hybrid and multi-cloud security 2024-11-11 at 07:11 By Mirko Zorz In this Help Net Security interview, Alex Freedland, CEO at Mirantis, discusses the cloud security challenges that CISOs need to tackle as multi-cloud and hybrid environments become the norm. He points out the expanded attack surfaces, the importance of consistent security

React to this headline:

Loading spinner

Strategies for CISOs navigating hybrid and multi-cloud security Read More »

Setting a security standard: From vulnerability to exposure management

Setting a security standard: From vulnerability to exposure management 2024-11-11 at 06:36 By Help Net Security Vulnerability management has been the standard approach to fending off cyber threats for years. Still, it falls short by focusing on a limited number of vulnerabilities, often resolving only 1% to 20% of issues. In 2024, with the average

React to this headline:

Loading spinner

Setting a security standard: From vulnerability to exposure management Read More »

Critical Palo Alto Networks Expedition bug exploited (CVE-2024-5910)

Critical Palo Alto Networks Expedition bug exploited (CVE-2024-5910) 2024-11-08 at 13:36 By Zeljka Zorz A vulnerability (CVE-2024-5910) in Palo Alto Networks Expedition, a firewall configuration migration tool, is being exploited by attackers in the wild, the Cybersecurity and Infrastructure Security Agency (CISA) confirmed on Thursday. About CVE-2024-5910 Unearthed and reported by Brian Hysell of Synopsys

React to this headline:

Loading spinner

Critical Palo Alto Networks Expedition bug exploited (CVE-2024-5910) Read More »

Apple’s 45-day certificate proposal: A call to action

Apple’s 45-day certificate proposal: A call to action 2024-11-08 at 08:00 By Help Net Security In a bold move, Apple has published a draft ballot for commentary to GitHub to shorten Transport Layer Security (TLS) certificates down from 398 days to just 45 days by 2027. The Apple proposal will likely go up for a

React to this headline:

Loading spinner

Apple’s 45-day certificate proposal: A call to action Read More »

Am I Isolated: Open-source container security benchmark

Am I Isolated: Open-source container security benchmark 2024-11-08 at 07:30 By Mirko Zorz Am I Isolated is an open-source container security benchmark that probes users’ runtime environments and tests for container isolation. The Rust-based container runtime scanner runs as a container, detecting gaps in users’ container runtime isolation. It also provides guidance to improve users’

React to this headline:

Loading spinner

Am I Isolated: Open-source container security benchmark Read More »

Industrial companies in Europe targeted with GuLoader

Industrial companies in Europe targeted with GuLoader 2024-11-07 at 15:48 By Zeljka Zorz A recent spear-phishing campaign targeting industrial and engineering companies in Europe was aimed at saddling victims with the popular GuLoader downloader and, ultimately, a remote access trojan that would permit attackers to steal information from and access compromised computers whenever they wish.

React to this headline:

Loading spinner

Industrial companies in Europe targeted with GuLoader Read More »

North Korean hackers employ new tactics to compromise crypto-related businesses

North Korean hackers employ new tactics to compromise crypto-related businesses 2024-11-07 at 13:49 By Zeljka Zorz North Korean hackers are targeting crypto-related businesses with phishing emails and novel macOS-specific malware. The crypto-related phishing campaign Since July 2024, phishing emails seemingly containing helpful information on risks related to the rise of the price of Bitcoin have

React to this headline:

Loading spinner

North Korean hackers employ new tactics to compromise crypto-related businesses Read More »

Critical vulnerability in Cisco industrial wireless access points fixed (CVE-2024-20418)

Critical vulnerability in Cisco industrial wireless access points fixed (CVE-2024-20418) 2024-11-07 at 11:33 By Zeljka Zorz Cisco has fixed a critical command injection vulnerability (CVE-2024-20418) affecting its Ultra-Reliable Wireless Backhaul (URWB) Access Points that can be exploited via a HTTP requests and allows complete compromise of the devices. There are no workarounds to address this

React to this headline:

Loading spinner

Critical vulnerability in Cisco industrial wireless access points fixed (CVE-2024-20418) Read More »

How AI will shape the next generation of cyber threats

How AI will shape the next generation of cyber threats 2024-11-07 at 08:08 By Mirko Zorz In this Help Net Security interview, Buzz Hillestad, CISO at Prismatic, discusses how AI’s advancement reshapes cybercriminal skillsets and lowers entry barriers for potential attackers. Hillestad highlights that, as AI tools become more accessible, organizations must adapt their defenses

React to this headline:

Loading spinner

How AI will shape the next generation of cyber threats Read More »

AWS security essentials for managing compliance, data protection, and threat detection

AWS security essentials for managing compliance, data protection, and threat detection 2024-11-07 at 07:03 By Help Net Security AWS offers a comprehensive suite of security tools to help organizations manage compliance, protect sensitive data, and detect threats within their environments. From AWS Security Hub and Amazon GuardDuty to Amazon Macie and AWS Config, each tool

React to this headline:

Loading spinner

AWS security essentials for managing compliance, data protection, and threat detection Read More »

Consumer privacy risks of data aggregation: What should organizations do?

Consumer privacy risks of data aggregation: What should organizations do? 2024-11-07 at 06:48 By Help Net Security In September 2024, the Federal Trade Commission (FTC) released an eye-opening report that digs into the data habits of nine major tech giants, including Amazon (Twitch), ByteDance (TikTok), Discord, Facebook, Reddit, Snap, Twitter, WhatsApp, and YouTube. The findings

React to this headline:

Loading spinner

Consumer privacy risks of data aggregation: What should organizations do? Read More »

Scroll to Top