Hot stuff

Using AI to drive cybersecurity risk scoring systems

Using AI to drive cybersecurity risk scoring systems 2024-11-15 at 07:18 By Help Net Security In this Help Net Security video, Venkat Gopalakrishnan, Principal Data Science Manager at Microsoft, discusses the development of AI-driven risk scoring models tailored for cybersecurity threats, and how AI is revolutionizing risk assessment and management in cybersecurity. The post Using […]

React to this headline:

Loading spinner

Using AI to drive cybersecurity risk scoring systems Read More »

NIST is chipping away at NVD backlog

NIST is chipping away at NVD backlog 2024-11-14 at 16:33 By Zeljka Zorz The National Institute of Standards and Technology (NIST) is clearing the backlog of unprocessed CVE-numbered vulnerabilities in the National Vulnerability Database (NVD), but has admitted that their initial estimate of when they would finish the job was “optimistic”. About the NVD The

React to this headline:

Loading spinner

NIST is chipping away at NVD backlog Read More »

FBI confirms China-linked cyber espionage involving breached telecom providers

FBI confirms China-linked cyber espionage involving breached telecom providers 2024-11-14 at 14:16 By Zeljka Zorz After months of news reports that Chinese threat actors have breached the networks of US telecommunications and internet service providers, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have confirmed the success of the attacks, which were part

React to this headline:

Loading spinner

FBI confirms China-linked cyber espionage involving breached telecom providers Read More »

How a Windows zero-day was exploited in the wild for months (CVE-2024-43451)

How a Windows zero-day was exploited in the wild for months (CVE-2024-43451) 2024-11-14 at 12:02 By Zeljka Zorz CVE-2024-43451, a Windows zero-day vulnerability for which Microsoft released a fix on November 2024 Patch Tuesday, has been exploited since at least April 2024, ClearSky researchers have revealed. About the vulnerability CVE-2024-43451 affects all supported Windows versions

React to this headline:

Loading spinner

How a Windows zero-day was exploited in the wild for months (CVE-2024-43451) Read More »

How Intel is making open source accessible to all developers

How Intel is making open source accessible to all developers 2024-11-14 at 07:33 By Mirko Zorz In this Help Net Security interview, Arun Gupta, Vice President and General Manager for Open Ecosystem, Intel, discusses the company’s commitment to fostering an open ecosystem as a cornerstone of its software strategy. He explains how this approach empowers

React to this headline:

Loading spinner

How Intel is making open source accessible to all developers Read More »

Zero-days dominate top frequently exploited vulnerabilities

Zero-days dominate top frequently exploited vulnerabilities 2024-11-14 at 07:03 By Mirko Zorz A joint report by leading cybersecurity agencies from the U.S., UK, Canada, Australia, and New Zealand has identified the most commonly exploited vulnerabilities of 2023. Zero-day vulnerabilities on the rise The advisory highlights that malicious cyber actors increasingly targeted zero-day vulnerabilities, posing significant

React to this headline:

Loading spinner

Zero-days dominate top frequently exploited vulnerabilities Read More »

What 2025 holds for user identity protection

What 2025 holds for user identity protection 2024-11-14 at 06:45 By Help Net Security In this Help Net Security video, David Cottingham, President of rf IDEAS, discusses what he sees as the most prominent areas for improvement and continued change in the space: As we move into 2025, it’s evident that businesses recognize MFA as

React to this headline:

Loading spinner

What 2025 holds for user identity protection Read More »

Aerospace employees targeted with malicious “dream job” offers

Aerospace employees targeted with malicious “dream job” offers 2024-11-13 at 12:49 By Zeljka Zorz It’s not just North Korean hackers who reach out to targets via LinkedIn: since at least September 2023, Iranian threat actor TA455 has been trying to compromise workers in the aerospace industry by impersonating job recruiters on the popular employment-focused social

React to this headline:

Loading spinner

Aerospace employees targeted with malicious “dream job” offers Read More »

CISOs in 2025: Balancing security, compliance, and accountability

CISOs in 2025: Balancing security, compliance, and accountability 2024-11-13 at 07:37 By Mirko Zorz In this Help Net Security interview, Daniel Schwalbe, CISO at DomainTools, discusses the intensifying regulatory demands that have reshaped CISO accountability and daily decision-making. He outlines the skill sets future CISOs need, their key priorities for 2025, and how increased pressure

React to this headline:

Loading spinner

CISOs in 2025: Balancing security, compliance, and accountability Read More »

Cyber professionals face an IP loss reckoning in 2025

Cyber professionals face an IP loss reckoning in 2025 2024-11-13 at 07:06 By Help Net Security AI can expose your work secrets. The same goes for AI-generated content, which has revolutionized workplace productivity but comes with hidden risks. As more employees use AI models to streamline tasks—whether drafting reports, building code, or designing products, they

React to this headline:

Loading spinner

Cyber professionals face an IP loss reckoning in 2025 Read More »

Tips for a successful cybersecurity job interview

Tips for a successful cybersecurity job interview 2024-11-13 at 06:35 By Anamarija Pogorelec Whether you’re looking to enhance your existing cybersecurity skills or just beginning your journey in the field, cybersecurity offers a wide range of career opportunities. If you’re considering a career shift, exploring new job opportunities, or aiming to upgrade your skill set,

React to this headline:

Loading spinner

Tips for a successful cybersecurity job interview Read More »

Microsoft fixes actively exploited zero-days (CVE-2024-43451, CVE-2024-49039)

Microsoft fixes actively exploited zero-days (CVE-2024-43451, CVE-2024-49039) 2024-11-12 at 23:03 By Zeljka Zorz November 2024 Patch Tuesday is here, and Microsoft has dropped fixes for 89 new security issues in its various products, two of which – CVE-2024-43451 and CVE-2024-49039 – are actively exploited by attackers. The exploited vulnerabilities (CVE-2024-43451, CVE-2024-49039) CVE-2024-43451 is yet another

React to this headline:

Loading spinner

Microsoft fixes actively exploited zero-days (CVE-2024-43451, CVE-2024-49039) Read More »

Massive troves of Amazon, HSBC employee data leaked

Massive troves of Amazon, HSBC employee data leaked 2024-11-12 at 12:18 By Zeljka Zorz A threat actor who goes by the online moniker “Nam3L3ss” has leaked employee data belonging to a number of corporations – including Amazon, 3M, HSBC and HP – ostensibly compromised during the May 2023 MOVEit hack by the Cl0p ransomware gang,

React to this headline:

Loading spinner

Massive troves of Amazon, HSBC employee data leaked Read More »

The changing face of identity security

The changing face of identity security 2024-11-12 at 08:03 By Help Net Security It’s easy to see why identity security is often synonymous with user security. Social engineering tactics are the mainstay of the threat actor’s arsenal, and it’s rare to find an attack that doesn’t feature them to some degree. Getting hold of privileged

React to this headline:

Loading spinner

The changing face of identity security Read More »

Evaluating your organization’s application risk management journey

Evaluating your organization’s application risk management journey 2024-11-12 at 07:33 By Mirko Zorz In this Help Net Security interview, Chris Wysopal, Chief Security Evangelist at Veracode, discusses strategies for CISOs to quantify application risk in financial terms. Wysopal outlines the need for continuous risk management practices and robust strategies to manage third-party software dependencies, ensuring

React to this headline:

Loading spinner

Evaluating your organization’s application risk management journey Read More »

Powerpipe: Open-source dashboards for DevOps

Powerpipe: Open-source dashboards for DevOps 2024-11-12 at 07:03 By Help Net Security Powerpipe is an open-source solution designed to streamline DevOps management with powerful visualization and compliance tools, making it simple to track, assess, and act on key data for smarter decision-making and continuous compliance monitoring. Dynamic dashboards and reports Powerpipe’s high-level dashboards offer an

React to this headline:

Loading spinner

Powerpipe: Open-source dashboards for DevOps Read More »

November 2024 Patch Tuesday forecast: New servers arrive early

November 2024 Patch Tuesday forecast: New servers arrive early 2024-11-11 at 08:03 By Help Net Security Microsoft followed their October precedent set with Windows 11 24H2 and announced Microsoft Server 2025 on the first of November. We were expecting the official announcement at Microsoft Ignite near the end of the month, but with the early

React to this headline:

Loading spinner

November 2024 Patch Tuesday forecast: New servers arrive early Read More »

4 reasons why veterans thrive as cybersecurity professionals

4 reasons why veterans thrive as cybersecurity professionals 2024-11-11 at 07:35 By Help Net Security Through their past military service, veterans are trained to think like adversaries, often share that mission-driven spirit and excel when working with a team to achieve a larger goal. They develop and champion the unique traits that cybersecurity companies need

React to this headline:

Loading spinner

4 reasons why veterans thrive as cybersecurity professionals Read More »

Strategies for CISOs navigating hybrid and multi-cloud security

Strategies for CISOs navigating hybrid and multi-cloud security 2024-11-11 at 07:11 By Mirko Zorz In this Help Net Security interview, Alex Freedland, CEO at Mirantis, discusses the cloud security challenges that CISOs need to tackle as multi-cloud and hybrid environments become the norm. He points out the expanded attack surfaces, the importance of consistent security

React to this headline:

Loading spinner

Strategies for CISOs navigating hybrid and multi-cloud security Read More »

Setting a security standard: From vulnerability to exposure management

Setting a security standard: From vulnerability to exposure management 2024-11-11 at 06:36 By Help Net Security Vulnerability management has been the standard approach to fending off cyber threats for years. Still, it falls short by focusing on a limited number of vulnerabilities, often resolving only 1% to 20% of issues. In 2024, with the average

React to this headline:

Loading spinner

Setting a security standard: From vulnerability to exposure management Read More »

Scroll to Top