Hot stuff

5 free vulnerability scanners you should check out

5 free vulnerability scanners you should check out 26/09/2023 at 08:02 By Help Net Security Vulnerability scanners delve into systems to uncover security gaps. The primary mission? To fortify organizations against breaches and shield sensitive data from exposure. Beyond merely pinpointing weaknesses, vulnerability scanning is a proactive measure to anticipate potential attacker entry points. The […]

React to this headline:

Loading spinner

5 free vulnerability scanners you should check out Read More »

MITRE ATT&CK project leader on why the framework remains vital for cybersecurity pros

MITRE ATT&CK project leader on why the framework remains vital for cybersecurity pros 26/09/2023 at 07:32 By Mirko Zorz MITRE ATT&CK, a common language for cybersecurity professionals to communicate with each other and better understand real-world adversary behaviors, celebrates its 10th anniversary this fall. In this Help Net Security interview, project leader Adam Pennington discusses

React to this headline:

Loading spinner

MITRE ATT&CK project leader on why the framework remains vital for cybersecurity pros Read More »

Cybersecurity skills employers are desperate to find in 2023

Cybersecurity skills employers are desperate to find in 2023 26/09/2023 at 07:01 By Help Net Security The surge in digital economic growth and our increasing dependence on it make cybersecurity a critical profession. In this Help Net Security video, Aaron Rosenmund, Director of Security Research and Curriculum, Pluralsight, discusses the most sought-after cybersecurity skills in

React to this headline:

Loading spinner

Cybersecurity skills employers are desperate to find in 2023 Read More »

National Student Clearinghouse MOVEit breach impacts nearly 900 schools

National Student Clearinghouse MOVEit breach impacts nearly 900 schools 25/09/2023 at 14:31 By Helga Labus US educational nonprofit organization National Student Clearinghouse (NSC) has revealed that the breach of its MOVEit server ended up affecting almost 900 colleges and universities, and resulted in the theft of personal information of their students. The National Student Clearinghouse

React to this headline:

Loading spinner

National Student Clearinghouse MOVEit breach impacts nearly 900 schools Read More »

Hands-on threat simulations: empower cybersecurity teams to confidently combat threats

Hands-on threat simulations: empower cybersecurity teams to confidently combat threats 25/09/2023 at 08:05 By Help Net Security Security processes are increasingly automated which has led some businesses to deprioritize developing their security teams’ defense skills. While antivirus and non-human generated threat detections efficiently identify vulnerabilities, they cannot detect every single threat. With the rising number

React to this headline:

Loading spinner

Hands-on threat simulations: empower cybersecurity teams to confidently combat threats Read More »

How global enterprises navigate the complex world of data privacy

How global enterprises navigate the complex world of data privacy 25/09/2023 at 07:38 By Mirko Zorz In this Help Net Security interview, Evelyn de Souza, Head of Privacy Compliance, Oracle SaaS Cloud, talks about the constant efforts required to keep up with privacy laws in each country, and ensuring compliance across the entire organization. She

React to this headline:

Loading spinner

How global enterprises navigate the complex world of data privacy Read More »

GitLab fixes critical vulnerability, patch now! (CVE-2023-5009)

GitLab fixes critical vulnerability, patch now! (CVE-2023-5009) 22/09/2023 at 13:31 By Helga Labus GitLab has fixed a critical vulnerability (CVE-2023-5009) in the Enterprise Edition (EE) and Community Edition (CE) of its widely used DevOps platform. They flaw may allow a threat actor to abuse scan execution policies to run pipelines as another user. About the

React to this headline:

Loading spinner

GitLab fixes critical vulnerability, patch now! (CVE-2023-5009) Read More »

Apple fixes 3 zero-day vulnerabilities exploited to compromise iPhones

Apple fixes 3 zero-day vulnerabilities exploited to compromise iPhones 22/09/2023 at 13:19 By Zeljka Zorz Apple has released updates for iOS and iPadOS, macOS, watchOS, and Safari to fix three zero-day vulnerabilities (CVE-2023-41992, CVE-2023-41991, CVE-2023-41993) exploited “against versions of iOS before iOS 16.7.” Bill Marczak of The Citizen Lab at The University of Toronto’s Munk

React to this headline:

Loading spinner

Apple fixes 3 zero-day vulnerabilities exploited to compromise iPhones Read More »

Why more security doesn’t mean more effective compliance

Why more security doesn’t mean more effective compliance 22/09/2023 at 08:31 By Help Net Security Financial institutions have always been a valuable target for cyberattacks. That’s partly why banking and financial institutions are heavily regulated and have more compliance requirements than those in most other industries. A slew of new rules have been put in

React to this headline:

Loading spinner

Why more security doesn’t mean more effective compliance Read More »

Signal takes a quantum leap with E2EE protocol upgrade

Signal takes a quantum leap with E2EE protocol upgrade 21/09/2023 at 16:01 By Helga Labus Signal has announced an upgrade to its end-to-end encryption (E2EE) protocol to protect users of its popular messaging app from encryption-breaking attacks through quantum computers. Getting ready for quantum computing “Quantum computing represents a new type of computational system which

React to this headline:

Loading spinner

Signal takes a quantum leap with E2EE protocol upgrade Read More »

Telecom firms hit with novel backdoors disguised as security software

Telecom firms hit with novel backdoors disguised as security software 21/09/2023 at 15:31 By Zeljka Zorz Researchers have unearthed new backdoors leveraged to maintain long-term access in the networks of telecom firms in the Middle East. HTTPSnoop and PipeSnoop – as the two implants have been dubbed by Cisco Talos researchers – have been disguised

React to this headline:

Loading spinner

Telecom firms hit with novel backdoors disguised as security software Read More »

Fake WinRAR PoC spread VenomRAT malware

Fake WinRAR PoC spread VenomRAT malware 21/09/2023 at 13:01 By Helga Labus An unknown threat actor has released a fake proof of concept (PoC) exploit for CVE-2023-4047, a recently fixed remote code execution (RCE) vulnerability in WinRAR, to spread the VenomRAT malware. The fake WinRAR PoC On August 17, 2023, Trend Micro’s Zero Day Initiative

React to this headline:

Loading spinner

Fake WinRAR PoC spread VenomRAT malware Read More »

Critical Trend Micro vulnerability exploited in the wild (CVE-2023-41179)

Critical Trend Micro vulnerability exploited in the wild (CVE-2023-41179) 21/09/2023 at 11:46 By Zeljka Zorz Trend Micro has fixed a critical zero-day vulnerability (CVE-2023-41179) in several of its endpoint security products for enterprises that has been spotted being exploited in the wild. About CVE-2023-41179 The nature of the flaw hasn’t been revealed, but we know

React to this headline:

Loading spinner

Critical Trend Micro vulnerability exploited in the wild (CVE-2023-41179) Read More »

How to set up and speed up Amazon S3 Replication for cross-region data replication

How to set up and speed up Amazon S3 Replication for cross-region data replication 21/09/2023 at 07:31 By Help Net Security Amazon S3 is a simple cloud storage solution enabling effortless storage and retrieval of large amounts of data from different geographies. It’s engineered for scalability, durability, and security, making it a popular option for

React to this headline:

Loading spinner

How to set up and speed up Amazon S3 Replication for cross-region data replication Read More »

How companies can take control of their cybersecurity

How companies can take control of their cybersecurity 21/09/2023 at 07:17 By Mirko Zorz In this Help Net Security interview, Baya Lonqueux, CEO at Reciproc-IT, discusses the evolving cybersecurity landscape and the essential skillsets needed for teams working in this field. The interview highlights the shift from technical expertise to a focus on organizational and

React to this headline:

Loading spinner

How companies can take control of their cybersecurity Read More »

Shadow IT: Security policies may be a problem

Shadow IT: Security policies may be a problem 20/09/2023 at 08:23 By Zeljka Zorz 3 out of 4 workers use personal (and often unmanaged) phones and laptops for work and nearly half of companies let unmanaged devices access protected resources, a recent report by Kolide and Dimensional Research has revealed. When asked why they use

React to this headline:

Loading spinner

Shadow IT: Security policies may be a problem Read More »

What AppSec and developers working in cloud-native environments need to know

What AppSec and developers working in cloud-native environments need to know 20/09/2023 at 08:05 By Help Net Security All enterprise organizations are, in essence, software publishers, regardless of their industry. This is because every enterprise relies on custom software applications for managing internal processes, interacting with customers, or analyzing data, making them creators and distributors

React to this headline:

Loading spinner

What AppSec and developers working in cloud-native environments need to know Read More »

18 free Microsoft Azure cybersecurity resources you should check out

18 free Microsoft Azure cybersecurity resources you should check out 20/09/2023 at 07:33 By Help Net Security Far exceeding a traditional public cloud platform, Azure is a comprehensive suite of over 200 products and cloud services engineered to solve current challenges and pave the way for the future. Whether you’re looking to build, run, or

React to this headline:

Loading spinner

18 free Microsoft Azure cybersecurity resources you should check out Read More »

Never use your master password as a password on other accounts

Never use your master password as a password on other accounts 19/09/2023 at 08:33 By Helga Labus One in three Americans now use password managers, up from one in five in 2022, according to an online poll by Security.org that quizzed 1,051 American adults on how they use passwords and password managers. How users choose

React to this headline:

Loading spinner

Never use your master password as a password on other accounts Read More »

Balancing budget and system security: Approaches to risk tolerance

Balancing budget and system security: Approaches to risk tolerance 19/09/2023 at 08:16 By Help Net Security Data breaches are a dime a dozen. Although it’s easy to look at that statement negatively, the positive viewpoint is that, as a result, cybersecurity professionals have plenty of learning moments. Learning what went wrong and why can be

React to this headline:

Loading spinner

Balancing budget and system security: Approaches to risk tolerance Read More »

Scroll to Top