News

Ivanti vTM auth bypass flaw exploited in attacks, CISA warns (CVE-2024-7593)

Ivanti vTM auth bypass flaw exploited in attacks, CISA warns (CVE-2024-7593) 2024-09-25 at 12:46 By Zeljka Zorz CVE-2024-7593, a critical authentication bypass vulnerability affecting Ivanti Virtual Traffic Manager (vTM) appliances, is actively exploited by attackers. The confirmation comes from the Cybersecurity and Infrastructure Security Agency (CISA), which added the flaw to its Known Exploited Vulnerabilities […]

React to this headline:

Loading spinner

Ivanti vTM auth bypass flaw exploited in attacks, CISA warns (CVE-2024-7593) Read More »

NetAlertX: Open-source Wi-Fi intruder detector

NetAlertX: Open-source Wi-Fi intruder detector 2024-09-25 at 08:01 By Mirko Zorz NetAlertX is an open-source Wi-Fi/LAN intruder detection tool that scans your network for connected devices and alerts you when new or unknown devices are detected. It provides visibility into your network activity to help you monitor unauthorized access. “NetAlertX comes with a range of

React to this headline:

Loading spinner

NetAlertX: Open-source Wi-Fi intruder detector Read More »

Securing non-human identities: Why fragmented strategies fail

Securing non-human identities: Why fragmented strategies fail 2024-09-25 at 07:31 By Mirko Zorz In this Help Net Security interview, John Yeoh, Global VP of Research at CSA, discusses the growing security challenges posed by non-human identities (NHIs). With NHIs now outnumbering human identities by 20 to 1, organizations are struggling to secure these digital entities

React to this headline:

Loading spinner

Securing non-human identities: Why fragmented strategies fail Read More »

Cybersecurity jobs available right now: September 25, 2024

Cybersecurity jobs available right now: September 25, 2024 2024-09-25 at 07:02 By Anamarija Pogorelec CISO Guardz | Israel | Hybrid – View job details As a CISO, you will develop and implement security policies and procedures to enhance the security of the company’s IT environment. Develop, implement, and maintain a comprehensive information security strategy to

React to this headline:

Loading spinner

Cybersecurity jobs available right now: September 25, 2024 Read More »

41% concerned about job security due to skill gaps

41% concerned about job security due to skill gaps 2024-09-25 at 06:31 By Help Net Security 35% of employees lack confidence that they have the skills required to succeed in their roles, according to Skillsoft. Additionally, 41% expressed concerns about job security due to gaps in their skills. Leadership skills rank highest for workplace success

React to this headline:

Loading spinner

41% concerned about job security due to skill gaps Read More »

Organizations are making email more secure, and it’s paying off

Organizations are making email more secure, and it’s paying off 2024-09-25 at 06:01 By Help Net Security Compromised identities have been a central component of countless costly breaches this year, according to Red Canary. Rise in identity and cloud-native attacks While most of the threats and techniques identified in the 2024 report remain consistent with

React to this headline:

Loading spinner

Organizations are making email more secure, and it’s paying off Read More »

Transportation, logistics companies targeted with lures impersonating fleet management software

Transportation, logistics companies targeted with lures impersonating fleet management software 2024-09-24 at 17:46 By Zeljka Zorz Financially motivated threat actors are targeting North American companies in the transportation and logistics sector with tailored lures, info-stealing malware, and a clever new trick. How the attack unfolds According to Proofpoint threat researchers, the attackers start by compromising

React to this headline:

Loading spinner

Transportation, logistics companies targeted with lures impersonating fleet management software Read More »

US-based Kaspersky users startled by unexpected UltraAV installation

US-based Kaspersky users startled by unexpected UltraAV installation 2024-09-24 at 15:46 By Zeljka Zorz A poorly executed “handover” of US-based Kaspersky customers has led some users to panic when software named UltraAV popped up on their computers without any action on their part. What happened? Earlier this year, for national security reasons, the US Department

React to this headline:

Loading spinner

US-based Kaspersky users startled by unexpected UltraAV installation Read More »

Telegram will share IP addresses, phone numbers of criminal suspects with cops

Telegram will share IP addresses, phone numbers of criminal suspects with cops 2024-09-24 at 13:01 By Zeljka Zorz Telegram will start handing over the IP addresses and phone numbers of users who violate their Terms of Service “to relevant authorities in response to valid legal requests”, Telegram founder and CEO Pavel Durov has announced on

React to this headline:

Loading spinner

Telegram will share IP addresses, phone numbers of criminal suspects with cops Read More »

Future-proofing cybersecurity: Why talent development is key

Future-proofing cybersecurity: Why talent development is key 2024-09-24 at 08:01 By Mirko Zorz In this Help Net Security interview, Jon France, CISO at ISC2, discusses cybersecurity workforce growth. He outlines organizations’ challenges, such as budget constraints and limited entry-level opportunities. France also points to the urgent need to upskill current employees and adopt inclusive hiring

React to this headline:

Loading spinner

Future-proofing cybersecurity: Why talent development is key Read More »

Discover how online fraud can impact your business

Discover how online fraud can impact your business 2024-09-24 at 07:31 By Help Net Security Recent reports underscore increased fraud losses driven by both old methods and new technologies. As fraudsters exploit advancements in AI and other sophisticated tools, their methods have become more difficult to combat. From AI-driven scams and sophisticated phishing attacks to

React to this headline:

Loading spinner

Discover how online fraud can impact your business Read More »

How cyber compliance helps minimize the risk of ransomware infections

How cyber compliance helps minimize the risk of ransomware infections 2024-09-24 at 07:01 By Help Net Security Over the past decade, ransomware has been cemented as one of the top cybersecurity threats. In 2023 alone, the FBI received 2,385 ransomware complaints, resulting in over $34 million in losses. To help businesses combat ransomware and other

React to this headline:

Loading spinner

How cyber compliance helps minimize the risk of ransomware infections Read More »

65% of websites are unprotected against simple bot attacks

65% of websites are unprotected against simple bot attacks 2024-09-24 at 06:31 By Help Net Security Companies across industries are seeing more bot-driven attacks, both basic and advanced, according to DataDome. An analysis of over 14,000 websites uncovered alarming gaps in protection against cyber fraud, particularly within consumer-centric industries. E-commerce and luxury industries are prime

React to this headline:

Loading spinner

65% of websites are unprotected against simple bot attacks Read More »

MFA bypass becomes a critical security issue as ransomware tactics advance

MFA bypass becomes a critical security issue as ransomware tactics advance 2024-09-24 at 06:01 By Help Net Security Ransomware is seen as the biggest cybersecurity threat across every industry, with 75% of organizations affected by ransomware more than once in the past 12 months – a jump from 61% in 2023, according to SpyCloud. Session

React to this headline:

Loading spinner

MFA bypass becomes a critical security issue as ransomware tactics advance Read More »

Windows Server 2025 gets hotpatching option, without reboots

Windows Server 2025 gets hotpatching option, without reboots 2024-09-23 at 17:02 By Zeljka Zorz Organizations that plan to upgrade to Windows Server 2025 once it becomes generally available will be able to implement some security updates by hotpatching running processes. What is hotpatching? “Hotpatching has been around for years in Windows Server 2022 Azure Edition,

React to this headline:

Loading spinner

Windows Server 2025 gets hotpatching option, without reboots Read More »

Organizations are changing cybersecurity providers in wake of Crowdstrike outage

Organizations are changing cybersecurity providers in wake of Crowdstrike outage 2024-09-23 at 15:46 By Zeljka Zorz More often than not, a cyber attack or a cyber incident that results in business disruption will spur organizations to make changes to improve their cybersecurity and cyber resilience – and sometimes that means changing cybersecurity providers. The recent

React to this headline:

Loading spinner

Organizations are changing cybersecurity providers in wake of Crowdstrike outage Read More »

Certainly: Open-source offensive security toolkit

Certainly: Open-source offensive security toolkit 2024-09-23 at 07:31 By Mirko Zorz Certainly is an open-source offensive security toolkit designed to capture extensive traffic across various network protocols in bit-flip and typosquatting scenarios. Built-in protocols: DNS, HTTP(S), IMAP(S), SMTP(S). “The reason why we created Certainly was to simplify the process of capturing and collecting requests that

React to this headline:

Loading spinner

Certainly: Open-source offensive security toolkit Read More »

Offensive cyber operations are more than just attacks

Offensive cyber operations are more than just attacks 2024-09-23 at 07:01 By Mirko Zorz In this Help Net Security interview, Christopher Jones, Chief Technology Officer and Chief Data Officer at Nightwing, talks about some key misconceptions and complexities surrounding offensive cyber operations. Many myths stem from a simplistic view of these operations, ranging from direct

React to this headline:

Loading spinner

Offensive cyber operations are more than just attacks Read More »

Paid open-source maintainers spend more time on security

Paid open-source maintainers spend more time on security 2024-09-23 at 06:31 By Help Net Security Paid maintainers are 55% more likely to implement critical security and maintenance practices than unpaid maintainers and are dedicating more time to implementing security practices like those included in industry standards like the OpenSSF Scorecard and the NIST Secure Software

React to this headline:

Loading spinner

Paid open-source maintainers spend more time on security Read More »

The surge in cyber insurance and what it means for your business

The surge in cyber insurance and what it means for your business 2024-09-23 at 06:01 By Help Net Security The cyber insurance market is set for explosive growth as organizations increasingly seek financial protection against rising cyber threats. This surge in demand reflects a broader shift in how businesses approach risk management, viewing cyber insurance

React to this headline:

Loading spinner

The surge in cyber insurance and what it means for your business Read More »

Scroll to Top