News

33 open-source cybersecurity solutions you didn’t know you needed

33 open-source cybersecurity solutions you didn’t know you needed 2024-09-10 at 06:31 By Help Net Security Open-source cybersecurity tools provide transparency and flexibility, allowing users to examine and customize the source code to fit specific security needs. These tools make cybersecurity accessible to a broader range of organizations and individuals. In this article, you will […]

React to this headline:

Loading spinner

33 open-source cybersecurity solutions you didn’t know you needed Read More »

Veeam Backup & Replication RCE flaw may soon be leveraged by ransomware gangs (CVE-2024-40711)

Veeam Backup & Replication RCE flaw may soon be leveraged by ransomware gangs (CVE-2024-40711) 2024-09-09 at 14:46 By Zeljka Zorz CVE-2024-40711, a critical vulnerability affecting Veeam Backup & Replication (VBR), could soon be exploited by attackers to steal enterprise data. Discovered and reported by Code WHite researcher Florian Hauser, the vulnerability can be leveraged for

React to this headline:

Loading spinner

Veeam Backup & Replication RCE flaw may soon be leveraged by ransomware gangs (CVE-2024-40711) Read More »

AI cybersecurity needs to be as multi-layered as the system it’s protecting

AI cybersecurity needs to be as multi-layered as the system it’s protecting 2024-09-09 at 08:01 By Help Net Security Cybercriminals are beginning to take advantage of the new malicious options that large language models (LLMs) offer them. LLMs make it possible to upload documents with hidden instructions that are executed by connected system components. This

React to this headline:

Loading spinner

AI cybersecurity needs to be as multi-layered as the system it’s protecting Read More »

OpenZiti: Secure, open-source networking for your applications

OpenZiti: Secure, open-source networking for your applications 2024-09-09 at 07:33 By Mirko Zorz OpenZiti is a free, open-source project that embeds zero-trust networking principles directly into applications. Example of an OpenZiti overlay network OpenZiti features “We created OpenZiti to transform how people think about connectivity. While OpenZiti is a zero-trust networking platform, you can also

React to this headline:

Loading spinner

OpenZiti: Secure, open-source networking for your applications Read More »

Best practices for implementing the Principle of Least Privilege

Best practices for implementing the Principle of Least Privilege 2024-09-09 at 07:02 By Mirko Zorz In this Help Net Security interview, Umaimah Khan, CEO of Opal Security, shares her insights on implementing the Principle of Least Privilege (PoLP). She discusses best practices for effective integration, benefits for operational efficiency and audit readiness, and how to

React to this headline:

Loading spinner

Best practices for implementing the Principle of Least Privilege Read More »

Phishing in focus: Disinformation, election and identity fraud

Phishing in focus: Disinformation, election and identity fraud 2024-09-09 at 06:34 By Help Net Security The frequency of phishing attacks is rising as attackers increasingly utilize AI to execute more scams than ever before. In this Help Net Security video, Abhilash Garimella, Head Of Research at Bolster, discusses how phishing scams are now being hosted

React to this headline:

Loading spinner

Phishing in focus: Disinformation, election and identity fraud Read More »

End of an era: Security budget growth slows down

End of an era: Security budget growth slows down 2024-09-09 at 06:01 By Help Net Security Amidst global economic and geopolitical uncertainty, markets are jittery, companies are spending frugally, and investors remain cautious, according to IANS Research and Artico Search. Security budgets are also affected by these realities with most budgets remaining flat or increasing

React to this headline:

Loading spinner

End of an era: Security budget growth slows down Read More »

Week in review: Vulnerability allows Yubico security keys cloning, Patch Tuesday forecast

Week in review: Vulnerability allows Yubico security keys cloning, Patch Tuesday forecast 2024-09-08 at 11:02 By Help Net Security Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Vulnerability allows Yubico security keys to be cloned Researchers have unearthed a cryptographic vulnerability in popular Yubico (FIDO) hardware security keys

React to this headline:

Loading spinner

Week in review: Vulnerability allows Yubico security keys cloning, Patch Tuesday forecast Read More »

Exposed: Russian military Unit 29155 does digital sabotage, espionage

Exposed: Russian military Unit 29155 does digital sabotage, espionage 2024-09-06 at 17:01 By Zeljka Zorz The US Department of Justice has named five Russian computer hackers as members of Unit 29155 – i.e., the 161st Specialist Training Center of the Russian General Staff Main Intelligence Directorate (GRU) – which they deem resposible for the 2022

React to this headline:

Loading spinner

Exposed: Russian military Unit 29155 does digital sabotage, espionage Read More »

Apache OFBiz team patches critical RCE vulnerability (CVE-2024-45195)

Apache OFBiz team patches critical RCE vulnerability (CVE-2024-45195) 2024-09-06 at 13:02 By Zeljka Zorz For the fourth time in the last five months, Apache OFBiz users have been advised to upgrade their installations to fix a critical flaw (CVE-2024-45195) that could lead to unauthenticated remote code execution. About CVE-2024-45195 Apache OFBiz is an open-source suite

React to this headline:

Loading spinner

Apache OFBiz team patches critical RCE vulnerability (CVE-2024-45195) Read More »

September 2024 Patch Tuesday forecast: Downgrade is the new exploit

September 2024 Patch Tuesday forecast: Downgrade is the new exploit 2024-09-06 at 08:16 By Help Net Security I asked for a calm August 2024 Patch Tuesday in last month’s forecast article and that came to pass. The updates released were limited to the regular operating systems and all forms of Office applications. Six zero-day vulnerabilities

React to this headline:

Loading spinner

September 2024 Patch Tuesday forecast: Downgrade is the new exploit Read More »

Human firewalls are essential to keeping SaaS environments safe

Human firewalls are essential to keeping SaaS environments safe 2024-09-06 at 08:01 By Help Net Security Businesses run on SaaS solutions: nearly every business function relies on multiple cloud-based tech platforms and collaborative work tools like Slack, Google Workspace apps, Jira, Zendesk and others. We recently surveyed security leaders and CISOs on top data security

React to this headline:

Loading spinner

Human firewalls are essential to keeping SaaS environments safe Read More »

Respotter: Open-source Responder honeypot

Respotter: Open-source Responder honeypot 2024-09-06 at 07:31 By Mirko Zorz Respotter is an open-source honeypot designed to detect attackers when they launch Responder within your environment. This application identifies active instances of Responder by exploiting its behavior when responding to any DNS query. Respotter leverages LLMNR, mDNS, and NBNS protocols to query a non-existent hostname

React to this headline:

Loading spinner

Respotter: Open-source Responder honeypot Read More »

The true cost of cybercrime for your business

The true cost of cybercrime for your business 2024-09-06 at 07:01 By Help Net Security As cybercriminals continue to refine their methods, blending traditional strategies with new technologies, the financial toll on individuals and organizations has reached alarming levels. Businesses are also grappling with mounting cybercrime costs from ransomware and DDoS attacks, which can inflict

React to this headline:

Loading spinner

The true cost of cybercrime for your business Read More »

83% of organizations experienced at least one ransomware attack in the last year

83% of organizations experienced at least one ransomware attack in the last year 2024-09-06 at 06:32 By Help Net Security Ransomware is an all-too-common occurrence: 83% of organizations have experienced at least one ransomware attack in the last year, 46% of respondents experienced four or more and 14% indicated they experienced 10 or more. Of

React to this headline:

Loading spinner

83% of organizations experienced at least one ransomware attack in the last year Read More »

New infosec products of the week: September 6, 2024

New infosec products of the week: September 6, 2024 2024-09-06 at 06:01 By Help Net Security Here’s a look at the most interesting products from the past week, featuring releases from Binarly, Bitdefender, Prompt Security, Revenera, Skyhigh Security, and Vanta. Bitdefender Security for Creators protects YouTube content creators and influencers from hackers Bitdefender Security for

React to this headline:

Loading spinner

New infosec products of the week: September 6, 2024 Read More »

Trustwave Named Frost & Sullivan Company of the Year

Trustwave Named Frost & Sullivan Company of the Year 2024-09-05 at 16:01 By Trustwave has received the Frost & Sullivan Excellence in Best Practices Company of the Year Award in the Americas Managed Security Services (MSS) market, recognizing Trustwave as being at the forefront of innovation and growth in this category. This article is an excerpt from

React to this headline:

Loading spinner

Trustwave Named Frost & Sullivan Company of the Year Read More »

Microchip Technology confirms theft of employee data

Microchip Technology confirms theft of employee data 2024-09-05 at 12:31 By Zeljka Zorz US-based semiconductor manufacturer Microchip Technology has confirmed that the cyberattack it suffered in August 2024 resulted in the theft of data, including “employee contact information and some encrypted and hashed passwords.” The breach was claimed later that month by the Play ransomware

React to this headline:

Loading spinner

Microchip Technology confirms theft of employee data Read More »

The future of automotive cybersecurity: Treating vehicles as endpoints

The future of automotive cybersecurity: Treating vehicles as endpoints 2024-09-05 at 07:31 By Zeljka Zorz The automotive industry is facing many of the same cybersecurity risks and threats that successful organizations in other sectors are up against, but it’s also battling some distinct ones. In this Help Net Security interview, Josh Smith, Principal Threat Analyst

React to this headline:

Loading spinner

The future of automotive cybersecurity: Treating vehicles as endpoints Read More »

How to gamify cybersecurity preparedness

How to gamify cybersecurity preparedness 2024-09-05 at 07:01 By Help Net Security Organizations’ preparedness and resilience against threats isn’t keeping pace with cybercriminals’ advancements. Some CEOs still believe that cybersecurity requires episodic intervention rather than ongoing attention. That isn’t the reality for many companies; cyber threat preparedness requires a concerted training effort, so cybersecurity teams

React to this headline:

Loading spinner

How to gamify cybersecurity preparedness Read More »

Scroll to Top