Hot stuff

Wire fraud scams escalate in real estate deals

Wire fraud scams escalate in real estate deals 2024-02-22 at 07:01 By Help Net Security In this Help Net Security video, Tyler Adams, CEO at CertifID, illustrates how the real estate sector needs to invest significant effort in educating consumers and implementing protective measures to safeguard real estate transactions. Recent CertifID research found that median […]

React to this headline:

Loading spinner

Wire fraud scams escalate in real estate deals Read More »

VMware pushes admins to uninstall vulnerable, deprecated vSphere plugin (CVE-2024-22245, CVE-2024-22250)

VMware pushes admins to uninstall vulnerable, deprecated vSphere plugin (CVE-2024-22245, CVE-2024-22250) 2024-02-21 at 15:01 By Zeljka Zorz VMware Enhanced Authentication Plug-in (EAP), a plugin for VMware vSphere, has two vulnerabilities (CVE-2024-22245, CVE-2024-22250) that could be exploited by attackers to mount authentication relay and session hijack attacks. The vulnerabilities haven’t been and won’t be fixed. Instead,

React to this headline:

Loading spinner

VMware pushes admins to uninstall vulnerable, deprecated vSphere plugin (CVE-2024-22245, CVE-2024-22250) Read More »

10 cybersecurity startups to watch in 2024

10 cybersecurity startups to watch in 2024 2024-02-21 at 08:01 By Mirko Zorz At Help Net Security, we’ve been following the cybersecurity business landscape closely for the past 25 years. Through our Industry News section, we’ve been tracking the pulse of the cybersecurity world, bringing you product news from companies worldwide. Certain vendors have consistently

React to this headline:

Loading spinner

10 cybersecurity startups to watch in 2024 Read More »

TruffleHog: Open-source solution for scanning secrets

TruffleHog: Open-source solution for scanning secrets 2024-02-21 at 07:31 By Mirko Zorz TruffleHog is an open-source scanner that identifies and addresses exposed secrets throughout your entire technology stack. “TruffleHog was originally a research tool I independently authored in 2016. When I published it, no tools were scanning Git revision history for secrets. My hunch was

React to this headline:

Loading spinner

TruffleHog: Open-source solution for scanning secrets Read More »

A closer look at Israeli cybersecurity funding and M&A activity in 2023

A closer look at Israeli cybersecurity funding and M&A activity in 2023 2024-02-21 at 07:01 By Help Net Security Last year was challenging for the global market, and the market downturn greatly affected even the historically resilient cybersecurity ecosystem. In this Help Net Security video, Merav Ben Avi, Content Manager at YL Ventures, talks about

React to this headline:

Loading spinner

A closer look at Israeli cybersecurity funding and M&A activity in 2023 Read More »

The importance of a good API security strategy

The importance of a good API security strategy 2024-02-21 at 06:32 By Helga Labus In 2024, API requests accounted for 57% of dynamic internet traffic around the globe, according to the Cloudflare 2024 API Security & Management Report, confirming that APIs are a crucial component of modern software development. But with their increased adoption over

React to this headline:

Loading spinner

The importance of a good API security strategy Read More »

LockBit takedown: Infrastructure disrupted, criminals arrested, decryption keys recovered

LockBit takedown: Infrastructure disrupted, criminals arrested, decryption keys recovered 2024-02-20 at 14:32 By Zeljka Zorz In the wake of yesterday’s surprise law enforcement takeover of LockBit’s leak site, the UK National Crime Agency (NCA) and Europol have shared more information about the extent of the takedown. “Today, after infiltrating the group’s network, the NCA has

React to this headline:

Loading spinner

LockBit takedown: Infrastructure disrupted, criminals arrested, decryption keys recovered Read More »

LockBit disrupted by international law enforcement task force

LockBit disrupted by international law enforcement task force 2024-02-20 at 13:01 By Zeljka Zorz On Monday afternoon, LockBit’s leak site has been taken over by a coalition of law enforcement agencies and is showing a seizure notice that promises more details today, at 11:30 GMT. “This site is now under the control of The National

React to this headline:

Loading spinner

LockBit disrupted by international law enforcement task force Read More »

Critical ConnectWise ScreenConnect vulnerabilities fixed, patch ASAP!

Critical ConnectWise ScreenConnect vulnerabilities fixed, patch ASAP! 2024-02-20 at 12:16 By Zeljka Zorz ConnectWise has fixed two vulnerabilities in ScreenConnect that could allow attackers to execute remote code or directly impact confidential data or critical systems. “There is no evidence that these vulnerabilities have been exploited in the wild, but immediate action must be taken

React to this headline:

Loading spinner

Critical ConnectWise ScreenConnect vulnerabilities fixed, patch ASAP! Read More »

How to make sense of the new SEC cyber risk disclosure rules

How to make sense of the new SEC cyber risk disclosure rules 2024-02-20 at 08:01 By Help Net Security SEC’s new cybersecurity risk management, strategy, governance, and incident disclosure rules, which require increased transparency around cybersecurity incidents, have been in effect since December 18, 2023. For businesses that already harbor concerns over their cybersecurity protections,

React to this headline:

Loading spinner

How to make sense of the new SEC cyber risk disclosure rules Read More »

How decentralized identity is shaping the future of data protection

How decentralized identity is shaping the future of data protection 2024-02-20 at 07:32 By Mirko Zorz In this Help Net Security interview, Patrick Harding, Chief Architect at Ping Identity, discusses the promises and implications of decentralized identity (DCI) in cybersecurity. By redistributing identity management responsibilities among issuers, holders, and verifiers, DCI empowers individuals to selectively

React to this headline:

Loading spinner

How decentralized identity is shaping the future of data protection Read More »

Why identity fraud costs organizations millions

Why identity fraud costs organizations millions 2024-02-20 at 07:01 By Help Net Security 92% of respondents to a recent report shared that their organization had been a victim of identity fraud, costing an average of $4.3 million over the last 12 months. Even so, only 40% stated identity verification as a top identity challenge, noting

React to this headline:

Loading spinner

Why identity fraud costs organizations millions Read More »

Balancing “super app” ambitions with privacy

Balancing “super app” ambitions with privacy 2024-02-19 at 08:31 By Help Net Security When Elon Musk’s ambitions to transform X into an “everything app” were divulged last year, he joined several companies known to be exploring or actively working on developing super apps, suggesting there’s clearly a niche to be filled. In fact, since the

React to this headline:

Loading spinner

Balancing “super app” ambitions with privacy Read More »

CVE Prioritizer: Open-source tool to prioritize vulnerability patching

CVE Prioritizer: Open-source tool to prioritize vulnerability patching 2024-02-19 at 08:01 By Mirko Zorz CVE Prioritizer is an open-source tool designed to assist in prioritizing the patching of vulnerabilities. It integrates data from CVSS, EPSS, and CISA’s KEV catalog to offer insights into the probability of exploitation and the potential effects of vulnerabilities on your

React to this headline:

Loading spinner

CVE Prioritizer: Open-source tool to prioritize vulnerability patching Read More »

Inside the strategy of Salesforce’s new Chief Trust Officer

Inside the strategy of Salesforce’s new Chief Trust Officer 2024-02-19 at 07:32 By Mirko Zorz Recently, Salesforce named Brad Arkin, previously Chief Security & Trust Officer at Cisco, the company’s new Chief Trust Officer. This was the perfect opportunity to find out more about his plans. In this Help Net Security interview, Arkin discusses a

React to this headline:

Loading spinner

Inside the strategy of Salesforce’s new Chief Trust Officer Read More »

RCE vulnerabilities fixed in SolarWinds enterprise solutions

RCE vulnerabilities fixed in SolarWinds enterprise solutions 2024-02-19 at 07:01 By Zeljka Zorz SolarWinds has released updates for Access Rights Manager (ARM) and (Orion) Platform that fix vulnerabilities that could allow attackers to execute code on vulnerable installations. SolarWinds ARM flaws fixed SolarWinds, the company whose Orion IT administration platform has been infamously compromised in

React to this headline:

Loading spinner

RCE vulnerabilities fixed in SolarWinds enterprise solutions Read More »

Gmail & Yahoo DMARC rollout: When cyber compliance gives a competitive edge

Gmail & Yahoo DMARC rollout: When cyber compliance gives a competitive edge 2024-02-16 at 08:01 By Help Net Security The essence of cybersecurity is not just about defense but enabling business through trust and reliability. As Gmail and Yahoo take steps to enforce stricter email authentication, organizations that are proactive in their DMARC compliance will

React to this headline:

Loading spinner

Gmail & Yahoo DMARC rollout: When cyber compliance gives a competitive edge Read More »

Cybersecurity sectors adjust as DDoS attacks reach new heights

Cybersecurity sectors adjust as DDoS attacks reach new heights 2024-02-16 at 07:05 By Help Net Security In this Help Net Security video, Andrey Slastenov, Head of Security Department at Gcore, discusses the findings of their latest report that provide insights into the current state of the DDoS protection market and cybersecurity trends. Key highlights from

React to this headline:

Loading spinner

Cybersecurity sectors adjust as DDoS attacks reach new heights Read More »

Battery maker Varta halts production after cyberattack

Battery maker Varta halts production after cyberattack 2024-02-15 at 14:17 By Helga Labus German battery manufacturer Varta was forced to shut down its IT systems and stop production as a result of a cyberattack. The Varta cyberattack The cyberattack occurred on Monday night and affected five of the company’s production plants and the administration. According

React to this headline:

Loading spinner

Battery maker Varta halts production after cyberattack Read More »

AI outsourcing: A strategic guide to managing third-party risks

AI outsourcing: A strategic guide to managing third-party risks 2024-02-15 at 08:01 By Help Net Security In an era of artificial intelligence (AI) revolutionizing business practices, many companies are turning to third-party AI services for a competitive edge. However, this approach comes with its own set of risks. From data security concerns to operational disruptions,

React to this headline:

Loading spinner

AI outsourcing: A strategic guide to managing third-party risks Read More »

Scroll to Top