Hot stuff

Black Hat USA 2023 video walkthrough

Black Hat USA 2023 video walkthrough 11/08/2023 at 15:04 By Help Net Security Help Net Security is in Las Vegas this week for Black Hat USA 2023, and this video provides a closer look at the event. The exhibitors featured in this video are: 1Password, Aqua Security, CISA, Cisco, CyberFOX, Darktrace, Dasera, Fortanix, Fortinet, Fortra, […]

React to this headline:

Loading spinner

Black Hat USA 2023 video walkthrough Read More »

How to handle API sprawl and the security threat it poses

How to handle API sprawl and the security threat it poses 11/08/2023 at 08:34 By Help Net Security The proliferation of APIs has marked them as prime targets for malicious attackers. With recent reports indicating that API vulnerabilities are costing businesses billions of dollars annually, it’s no wonder they are at the top of mind

React to this headline:

Loading spinner

How to handle API sprawl and the security threat it poses Read More »

How digital content security stays resilient amid evolving threats

How digital content security stays resilient amid evolving threats 11/08/2023 at 07:32 By Mirko Zorz With threats evolving and multiplying, it’s essential to understand how technological advancements can serve as both a challenge and an opportunity to safeguard digital content. In this Help Net Security interview, Rusty Cumpston, CEO at RKVST, discusses blockchain’s role in

React to this headline:

Loading spinner

How digital content security stays resilient amid evolving threats Read More »

How to accelerate and access DDoS protection services using GRE

How to accelerate and access DDoS protection services using GRE 11/08/2023 at 06:31 By Help Net Security As we entered 2023, the cybersecurity landscape witnessed an increase in sophisticated, high-volume attacks, according to Gcore. The maximum attack power rose from 600 to 800 Gbps. UDP flood attacks were most common and amounted to 52% of

React to this headline:

Loading spinner

How to accelerate and access DDoS protection services using GRE Read More »

Will AI kill cybersecurity jobs?

Will AI kill cybersecurity jobs? 10/08/2023 at 07:35 By Help Net Security Some ten years ago, the authors of The Second Machine Age wrote that “computers and other digital advances are doing for mental power—the ability to use our brains to understand and shape our environments—what the steam engine and its descendants did for muscle

React to this headline:

Loading spinner

Will AI kill cybersecurity jobs? Read More »

Learning from past healthcare breaches to fortify future cybersecurity strategies

Learning from past healthcare breaches to fortify future cybersecurity strategies 10/08/2023 at 07:02 By Help Net Security In the face of rising cyber threats, the healthcare sector has become a hotbed for cyberattacks. Given the gravity of this situation, we sat down with Shenny Sheth, Deputy CISO at Centura Health, who sheds light on the

React to this headline:

Loading spinner

Learning from past healthcare breaches to fortify future cybersecurity strategies Read More »

What to know about FedRAMP Rev. 5 Baselines

What to know about FedRAMP Rev. 5 Baselines 10/08/2023 at 06:31 By Help Net Security In this Help Net Security video, Kaus Phaltankar, CEO at Caveonix, discusses how the recent approval of the FedRAMP Rev. 5 Baselines is a significant step forward in the cloud security and compliance domain. The implications for CSPs and third-party

React to this headline:

Loading spinner

What to know about FedRAMP Rev. 5 Baselines Read More »

Google unveils stronger cellular security for Android 14

Google unveils stronger cellular security for Android 14 09/08/2023 at 13:49 By Helga Labus Google has revealed new cellular security mitigations that will be available for users and enterprises on its soon-to-be-released Android 14, and announced a new release schedule for Chrome Stable channel updates. Boosting network security on Android 14 Even though 2G service

React to this headline:

Loading spinner

Google unveils stronger cellular security for Android 14 Read More »

Downfall attacks can gather passwords, encryption keys from Intel processors

Downfall attacks can gather passwords, encryption keys from Intel processors 09/08/2023 at 13:02 By Zeljka Zorz A variety of Intel Core processors and the devices using them are vulnerable to “Downfall”, a new class of attacks made possible by CVE-2022-40982, which enables attackers to access and steal sensitive data such as passwords, encryption keys, and

React to this headline:

Loading spinner

Downfall attacks can gather passwords, encryption keys from Intel processors Read More »

Why cybersecurity is a blue-collar job

Why cybersecurity is a blue-collar job 09/08/2023 at 07:32 By Help Net Security Cybersecurity has witnessed exponential growth in recent years, fueled by the increasing sophistication of cyber threats. As the demand for skilled professionals continues to surge, traditional approaches to education and job requirements are being challenged. In this article, I will explore the

React to this headline:

Loading spinner

Why cybersecurity is a blue-collar job Read More »

Using creative recruitment strategies to tackle the cybersecurity skills shortage

Using creative recruitment strategies to tackle the cybersecurity skills shortage 09/08/2023 at 07:03 By Mirko Zorz With the increasing complexity of cyber threats and the global shortage of cybersecurity experts, organizations are looking for creative approaches to recruiting and retaining top talent. In this Help Net Security interview, Jon Check, Executive Director of Cybersecurity Protection

React to this headline:

Loading spinner

Using creative recruitment strategies to tackle the cybersecurity skills shortage Read More »

August 2023 Patch Tuesday: Microsoft fixes critical bugs in Teams, MSMQ

August 2023 Patch Tuesday: Microsoft fixes critical bugs in Teams, MSMQ 08/08/2023 at 22:46 By Zeljka Zorz August 2023 Patch Tuesday is here; among the 76 CVE-numbered issues fixed by Microsoft this time around is a DoS vulnerability in .NET and Visual Studio (CVE-2023-38180) for which proof-of-exploit code exists. Other than the fact that a

React to this headline:

Loading spinner

August 2023 Patch Tuesday: Microsoft fixes critical bugs in Teams, MSMQ Read More »

North Korean hackers breached Russian missile development firm

North Korean hackers breached Russian missile development firm 08/08/2023 at 16:46 By Helga Labus North Korean state-sponsored hackers have breached Russian missile maker NPO Mashinostroyeniya, according to SentinelLabs researchers. North Korean hackers discovered The researchers came across leaked email communication between NPO Mashinostroyeniya’s IT staff that contained information about a possible cyber intrusion first detected

React to this headline:

Loading spinner

North Korean hackers breached Russian missile development firm Read More »

For TSA’s updated Pipeline Security Directive, consistency and collaboration are key

For TSA’s updated Pipeline Security Directive, consistency and collaboration are key 08/08/2023 at 08:03 By Help Net Security Late last month, the Transportation Security Administration renewed and updated its security directive aimed at enhancing the cybersecurity of oil and natural gas pipelines. The reissued guidance, known as Security Directive (SD) Pipeline-2021-02D Pipeline Cybersecurity Mitigation, Actions,

React to this headline:

Loading spinner

For TSA’s updated Pipeline Security Directive, consistency and collaboration are key Read More »

Getting the best possible outcome in ransomware negotiation

Getting the best possible outcome in ransomware negotiation 08/08/2023 at 07:32 By Mirko Zorz Though typically seen as a final measure, 90% of participants from a BigID survey revealed that their company would contemplate paying a ransom if it meant they could recover data and business processes, or recover them faster. In this Help Net

React to this headline:

Loading spinner

Getting the best possible outcome in ransomware negotiation Read More »

Dark web activity targeting the financial sector

Dark web activity targeting the financial sector 08/08/2023 at 07:01 By Help Net Security In this Help Net Security video, Jim Simpson, Director of Threat Intelligence at Searchlight Cyber, discusses threats against the financial sector. Threat actors will invariably target banks, yet by keeping an eye on the dark web, these institutions can identify illegal

React to this headline:

Loading spinner

Dark web activity targeting the financial sector Read More »

Keystroke sounds can betray passwords

Keystroke sounds can betray passwords 07/08/2023 at 15:48 By Helga Labus Researchers from several UK universities have proven that the recorded sounds of laptop keystrokes can be used to obtain sensitive user data such as passwords with a high accuracy. Sounds of keystrokes can reveal passwords, other sensitive data Side-channel attacks (SCAs) are carried out

React to this headline:

Loading spinner

Keystroke sounds can betray passwords Read More »

8 free cybersecurity documentaries you can watch right now

8 free cybersecurity documentaries you can watch right now 07/08/2023 at 08:05 By Help Net Security The line between physical and digital safety continues to blur, making cybersecurity a universal concern. The intricacies of cybersecurity can often feel esoteric, leaving many outside the industry feeling daunted. However, with increasing resources becoming available, getting a handle

React to this headline:

Loading spinner

8 free cybersecurity documentaries you can watch right now Read More »

Zoom CISO Michael Adams discusses cybersecurity threats, solutions, and the future

Zoom CISO Michael Adams discusses cybersecurity threats, solutions, and the future 07/08/2023 at 07:32 By Mirko Zorz In this exclusive Help Net Security interview, we delve into the world of cybersecurity with Michael Adams, the CISO at Zoom. Adams analyzes how organizations grapple with the effects of workforce shortages and remote work complications, offering insights

React to this headline:

Loading spinner

Zoom CISO Michael Adams discusses cybersecurity threats, solutions, and the future Read More »

Scroll to Top