News

Key factors for effective security automation

Key factors for effective security automation 27/07/2023 at 06:31 By Mirko Zorz Harnessing the potential of automation in cybersecurity is key to maintaining a robust defense against ever-evolving threats. Still, this approach comes with its own unique challenges. In this Help Net Security interview, Oliver Rochford, Chief Futurist at Tenzir, discusses how automation can be […]

React to this headline:

Loading spinner

Key factors for effective security automation Read More »

UAC: Live response collection script for incident response

UAC: Live response collection script for incident response 27/07/2023 at 05:33 By Help Net Security Unix-like Artifacts Collector (UAC) is a live response collection script for incident response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD, and Solaris systems artifacts. It

React to this headline:

Loading spinner

UAC: Live response collection script for incident response Read More »

Cryptojacking soars as cyberattacks increase, diversify

Cryptojacking soars as cyberattacks increase, diversify 27/07/2023 at 05:03 By Help Net Security Digital threat actors are adopting evolving tactical behaviors, opting for different types of malicious attacks compared to previous years, according to SonicWall. Overall intrusion attempts were up, led by the highest year on record for global cryptojacking volume recorded by SonicWall, as

React to this headline:

Loading spinner

Cryptojacking soars as cyberattacks increase, diversify Read More »

SEC adopts new cybersecurity incident disclosure rules for companies

SEC adopts new cybersecurity incident disclosure rules for companies 26/07/2023 at 21:01 By Help Net Security The Securities and Exchange Commission (SEC) today adopted rules requiring registrants to disclose material cybersecurity incidents they experience and to disclose on an annual basis material information regarding their cybersecurity risk management, strategy, and governance. The Commission also adopted

React to this headline:

Loading spinner

SEC adopts new cybersecurity incident disclosure rules for companies Read More »

MikroTik vulnerability could be used to hijack 900,000 routers (CVE-2023-30799)

MikroTik vulnerability could be used to hijack 900,000 routers (CVE-2023-30799) 26/07/2023 at 16:47 By Zeljka Zorz A privilege escalation vulnerability (CVE-2023-30799) could allow attackers to commandeer up to 900,000 MikroTik routers, says VulnCheck researcher Jacob Baines. While exploting it does require authentication, acquiring credentials to access the routers is not that difficult. “RouterOS [the underlying

React to this headline:

Loading spinner

MikroTik vulnerability could be used to hijack 900,000 routers (CVE-2023-30799) Read More »

Enterprises should layer-up security to avoid legal repercussions

Enterprises should layer-up security to avoid legal repercussions 26/07/2023 at 08:03 By Help Net Security The role of CISO these days requires a strong moral compass: You have to be the one speaking up for the protection of customer data and be ready to handle uncomfortable situations such as pressure to downplay an actual breach.

React to this headline:

Loading spinner

Enterprises should layer-up security to avoid legal repercussions Read More »

Overcoming the cybersecurity talent shortage with upskilling initiatives

Overcoming the cybersecurity talent shortage with upskilling initiatives 26/07/2023 at 07:31 By Mirko Zorz In this Help Net Security interview, Dr. Lindsey Polley de Lopez, Director of Cyber & Space Intelligence at MACH37, proposes strategies for companies, educational institutions, and governments on how to address the ongoing shortage of cybersecurity talent through the introduction of

React to this headline:

Loading spinner

Overcoming the cybersecurity talent shortage with upskilling initiatives Read More »

Product showcase: Stellar Toolkit for Exchange – Restore Exchange Database

Product showcase: Stellar Toolkit for Exchange – Restore Exchange Database 26/07/2023 at 07:02 By Help Net Security Time is of the essence when it comes to recovery after Exchange Server failure or database corruption, as organizations depend on emails for their day-to-day business communication. The more the delay in restoring services and recovering data, the

React to this headline:

Loading spinner

Product showcase: Stellar Toolkit for Exchange – Restore Exchange Database Read More »

Zero trust rated as highly effective by businesses worldwide

Zero trust rated as highly effective by businesses worldwide 26/07/2023 at 06:33 By Help Net Security Zero trust is here to stay, with 82% of experts currently working on implementing zero trust, and 16% planning to begin within 18 months, according to Beyond Identity. Over 90% of those working on zero trust cited that the

React to this headline:

Loading spinner

Zero trust rated as highly effective by businesses worldwide Read More »

Companies encounter months-long delays in filling critical security positions

Companies encounter months-long delays in filling critical security positions 26/07/2023 at 06:02 By Help Net Security A lack of executive understanding and an ever-widening talent gap that is placing an unsustainable burden on security teams to prevent business-ending breaches, according to Swimlane. The research investigated the perceptions of cybersecurity among on-the-ground security professionals and executives,

React to this headline:

Loading spinner

Companies encounter months-long delays in filling critical security positions Read More »

Ivanti zero-day exploited to target Norwegian government (CVE-2023-35078)

Ivanti zero-day exploited to target Norwegian government (CVE-2023-35078) 25/07/2023 at 13:37 By Zeljka Zorz A zero-day vulnerability (CVE-2023-35078) affecting Ivanti Endpoint Manager Mobile (EPMM) has been exploited to carry out an attack that affected 12 Norwegian ministries, the Norwegian National Security Authority (NSM) has confirmed on Tuesday. What is known about the attacks? On Monday,

React to this headline:

Loading spinner

Ivanti zero-day exploited to target Norwegian government (CVE-2023-35078) Read More »

Apple fixes exploited zero-day in all of its OSes (CVE-2023-38606)

Apple fixes exploited zero-day in all of its OSes (CVE-2023-38606) 25/07/2023 at 12:57 By Helga Labus Apple has patched an exploited zero-day kernel vulnerability (CVE-2023-38606) in iOS, iPadOS, macOS, watchOS and tvOS. CVE-2023-38606 fix has been backported In early July, Apple fixed an actively exploited zero-day vulnerability (CVE-2023-37450) in WebKit. The vulnerability has been patched

React to this headline:

Loading spinner

Apple fixes exploited zero-day in all of its OSes (CVE-2023-38606) Read More »

Inspiring secure coding: Strategies to encourage developers’ continuous improvement

Inspiring secure coding: Strategies to encourage developers’ continuous improvement 25/07/2023 at 07:38 By Mirko Zorz In software development, the importance of secure coding practices cannot be overstated. Fostering a security culture within development teams has become crucial to ensure the integrity and protection of digital systems. To delve deeper into this topic, we had the

React to this headline:

Loading spinner

Inspiring secure coding: Strategies to encourage developers’ continuous improvement Read More »

Companies are rushing into generative AI without a cohesive, secure strategy

Companies are rushing into generative AI without a cohesive, secure strategy 25/07/2023 at 06:32 By Help Net Security Despite mass adoption of generative AI, most companies don’t have a coordinated strategy for deploying it or know how to assess its security—exposing them to risks and disadvantages if they don’t change their approach, according to Grammarly.

React to this headline:

Loading spinner

Companies are rushing into generative AI without a cohesive, secure strategy Read More »

RaaS proliferation: 14 new ransomware groups target organizations worldwide

RaaS proliferation: 14 new ransomware groups target organizations worldwide 25/07/2023 at 06:00 By Help Net Security In the Q2 2023, GuidePoint Research and Intelligence Team (GRIT) tracked 1,177 total publicly posted ransomware victims claimed by 41 different threat groups. The most impacted industries GRIT’s report shows a 38% increase in public ransomware victims compared to

React to this headline:

Loading spinner

RaaS proliferation: 14 new ransomware groups target organizations worldwide Read More »

Has the MOVEit hack paid off for Cl0p?

Has the MOVEit hack paid off for Cl0p? 24/07/2023 at 17:18 By Zeljka Zorz The number of known Cl0p victims resulting from its Memorial Day attack on vulnerable internet-facing MOVEit Transfer installations has surpassed 420, according to IT market research company KonBriefing Research. The cyber extortion group has lately switched to setting up company-specific leak

React to this headline:

Loading spinner

Has the MOVEit hack paid off for Cl0p? Read More »

US companies commit to safe, transparent AI development

US companies commit to safe, transparent AI development 24/07/2023 at 16:30 By Helga Labus Seven US artificial intelligence (AI) giants – Amazon, Anthropic, Google, Inflection, Meta, Microsoft, and OpenAI – have publicly committed to “help move toward safe, secure, and transparent development of AI technology.” The commitments “Companies that are developing these emerging technologies have

React to this headline:

Loading spinner

US companies commit to safe, transparent AI development Read More »

Average cost of a data breach reaches $4.45 million in 2023

Average cost of a data breach reaches $4.45 million in 2023 24/07/2023 at 11:18 By Help Net Security IBM released its annual Cost of a Data Breach Report, showing the global average cost of a data breach reached $4.45 million in 2023 – an all-time high for the report and a 15% increase over the

React to this headline:

Loading spinner

Average cost of a data breach reaches $4.45 million in 2023 Read More »

Bridging the cybersecurity skills gap through cyber range training

Bridging the cybersecurity skills gap through cyber range training 24/07/2023 at 07:31 By Mirko Zorz In this Help Net Security interview, Debbie Gordon, CEO of Cloud Range explains the concept of a cyber range, its crucial role in preparing for real-world cyber threats, and the importance of realism in cyber training scenarios. Gordon also discusses

React to this headline:

Loading spinner

Bridging the cybersecurity skills gap through cyber range training Read More »

Consumers demand more from businesses when it comes to security

Consumers demand more from businesses when it comes to security 24/07/2023 at 06:01 By Help Net Security Fraudsters are opportunistic criminals and 2022 and the first few months of this year brought opportunities like never before, according to Experian. This volatility perpetuated an unpredictable atmosphere for both businesses and consumers alike. The report found that

React to this headline:

Loading spinner

Consumers demand more from businesses when it comes to security Read More »

Scroll to Top