News

Google patches actively exploited Android vulnerability (CVE-2024-43093)

Google patches actively exploited Android vulnerability (CVE-2024-43093) 2024-11-05 at 13:34 By Zeljka Zorz Google has delivered fixes for two vulnerabilities endangering Android users that “may be under limited, targeted exploitation”: CVE-2024-43047, a flaw affecting Qualcomm chipsets, and CVE-2024-43093, a vulnerability in the Google Play framework. The exploited vulnerabilities (CVE-2024-43047, CVE-2024-43093) Qualcomm patched CVE-2024-43047 – a […]

React to this headline:

Loading spinner

Google patches actively exploited Android vulnerability (CVE-2024-43093) Read More »

Report: Voice of Practitioners 2024 – The True State of Secrets Security

Report: Voice of Practitioners 2024 – The True State of Secrets Security 2024-11-05 at 12:33 By Help Net Security In this study, GitGuardian and CyberArk reveal the stark reality of secrets management across 1,000 organizations. With 79% experiencing secrets leaks and an average remediation time of 27 days, the findings expose critical gaps between security

React to this headline:

Loading spinner

Report: Voice of Practitioners 2024 – The True State of Secrets Security Read More »

Open-source software: A first attempt at organization after CRA

Open-source software: A first attempt at organization after CRA 2024-11-05 at 08:03 By Help Net Security The open-source software (OSS) industry is developing the core software for the global infrastructure, to the point that even some proprietary software giants adopt Linux servers for their cloud services. Still, it has never been able to get organized

React to this headline:

Loading spinner

Open-source software: A first attempt at organization after CRA Read More »

Maximizing security visibility on a budget

Maximizing security visibility on a budget 2024-11-05 at 07:03 By Mirko Zorz In this Help Net Security interview, Barry Mainz, CEO at Forescout, discusses the obstacles organizations encounter in attaining security visibility, particularly within cloud and hybrid environments. He explains why asset intelligence—going beyond basic visibility to understand device behavior and risk—is essential. Mainz also

React to this headline:

Loading spinner

Maximizing security visibility on a budget Read More »

Cybersecurity jobs available right now: November 5, 2024

Cybersecurity jobs available right now: November 5, 2024 2024-11-05 at 06:38 By Anamarija Pogorelec Application Security Engineer MassMutual | USA | Hybrid – View job details As an Application Security Engineer, you will conduct in-depth security assessments, including vulnerability scanning, and code reviews. Ensure secure coding practices are followed, and security controls are incorporated into

React to this headline:

Loading spinner

Cybersecurity jobs available right now: November 5, 2024 Read More »

AI learning mechanisms may lead to increase in codebase leaks

AI learning mechanisms may lead to increase in codebase leaks 2024-11-05 at 06:03 By Help Net Security The proliferation of non-human identities and the complexity of modern application architectures has created significant security challenges, particularly in managing sensitive credentials, according to GitGuardian. Based on a survey of 1,000 IT decision-makers in organizations with over 500

React to this headline:

Loading spinner

AI learning mechanisms may lead to increase in codebase leaks Read More »

Millions of Synology NAS devices vulnerable to zero-click attacks (CVE-2024-10443)

Millions of Synology NAS devices vulnerable to zero-click attacks (CVE-2024-10443) 2024-11-04 at 16:04 By Zeljka Zorz Synology has released fixes for an unauthenticated “zero-click” remote code execution flaw (CVE-2024-10443, aka RISK:STATION) affecting its popular DiskStation and BeeStation network attached storage (NAS) devices. About CVE-2024-10443 CVE-2024-10443 was discovered by Rick de Jager, a security researcher at

React to this headline:

Loading spinner

Millions of Synology NAS devices vulnerable to zero-click attacks (CVE-2024-10443) Read More »

Hiring guide: Key skills for cybersecurity researchers

Hiring guide: Key skills for cybersecurity researchers 2024-11-04 at 07:33 By Mirko Zorz In this Help Net Security interview, Rachel Barouch, an Organizational Coach for VCs and startups and a former VP HR in both a VC and a Cybersecurity startup, discusses the dynamics of cybersecurity researchers and team-building strategies. She highlights that these researchers,

React to this headline:

Loading spinner

Hiring guide: Key skills for cybersecurity researchers Read More »

Whispr: Open-source multi-vault secret injection tool

Whispr: Open-source multi-vault secret injection tool 2024-11-04 at 07:03 By Mirko Zorz Whispr is an open-source CLI tool designed to securely inject secrets from secret vaults, such as AWS Secrets Manager and Azure Key Vault, directly into your application’s environment. This enhances secure local software development by seamlessly managing sensitive information. Whispr key features Safe

React to this headline:

Loading spinner

Whispr: Open-source multi-vault secret injection tool Read More »

Strong privacy laws boost confidence in sharing information with AI

Strong privacy laws boost confidence in sharing information with AI 2024-11-04 at 06:03 By Help Net Security 53% of consumers report being aware of their national privacy laws, a 17-percentage point increase compared to 2019, according to Cisco. Informed consumers are also much more likely to feel their data is protected (81%) compared to those

React to this headline:

Loading spinner

Strong privacy laws boost confidence in sharing information with AI Read More »

Week in review: Windows Themes spoofing bug “returns”, employees phished via Microsoft Teams

Week in review: Windows Themes spoofing bug “returns”, employees phished via Microsoft Teams 2024-11-03 at 11:03 By Help Net Security Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Patching problems: The “return” of a Windows Themes spoofing vulnerability Despite two patching attempts, a security issue that may allow

React to this headline:

Loading spinner

Week in review: Windows Themes spoofing bug “returns”, employees phished via Microsoft Teams Read More »

50% of financial orgs have high-severity security flaws in their apps

50% of financial orgs have high-severity security flaws in their apps 2024-11-01 at 08:03 By Help Net Security Security debt, defined for this report as flaws that remain unfixed for longer than a year, exists in 76% of organizations in the financial services sector, with 50% of organizations carrying critical security debt, according to Veracode.

React to this headline:

Loading spinner

50% of financial orgs have high-severity security flaws in their apps Read More »

How open-source MDM solutions simplify cross-platform device management

How open-source MDM solutions simplify cross-platform device management 2024-11-01 at 07:33 By Mirko Zorz In this Help Net Security interview, Mike McNeil, CEO at Fleet, talks about the security risks posed by unmanaged mobile devices and how mobile device management (MDM) solutions help address them. He also discusses employee resistance to MDM and how open-source

React to this headline:

Loading spinner

How open-source MDM solutions simplify cross-platform device management Read More »

OpenPaX: Open-source kernel patch that mitigates memory safety errors

OpenPaX: Open-source kernel patch that mitigates memory safety errors 2024-11-01 at 07:03 By Mirko Zorz OpenPaX is an open-source kernel patch that mitigates common memory safety errors, re-hardening systems against application-level memory safety attacks using a simple Linux kernel patch. It’s available under the same GPLv2 license terms as the Linux kernel. “We are pleased

React to this headline:

Loading spinner

OpenPaX: Open-source kernel patch that mitigates memory safety errors Read More »

Threat actors are stepping up their tactics to bypass email protections

Threat actors are stepping up their tactics to bypass email protections 2024-11-01 at 06:33 By Help Net Security Although most organizations use emails with built-in security features that filter out suspicious messages, criminals always find a way to bypass these systems. With the development of AI technology, phishing is becoming increasingly difficult to recognize, allowing

React to this headline:

Loading spinner

Threat actors are stepping up their tactics to bypass email protections Read More »

Infosec products of the month: October 2024

Infosec products of the month: October 2024 2024-11-01 at 06:04 By Help Net Security Here’s a look at the most interesting products from the past month, featuring releases from: Action1, Balbix, BreachLock, Commvault, Dashlane, Data Theorem, Edgio, ExtraHop, Fastly, Frontegg, GitGuardian, IBM, Ivanti, Jumio, Kusari, Legit Security, Metomic, Nametag, Neon, Nucleus Security, Okta, Qualys, Rubrik,

React to this headline:

Loading spinner

Infosec products of the month: October 2024 Read More »

Sophos mounted counter-offensive operation to foil Chinese attackers

Sophos mounted counter-offensive operation to foil Chinese attackers 2024-10-31 at 16:04 By Help Net Security Sophos conducted defensive and counter-offensive operation over the last five years with multiple interlinked nation-state adversaries based in China targeting perimeter devices, including Sophos Firewalls. Espionage campaigns tied to Chinese hacking groups The attackers used a series of campaigns with

React to this headline:

Loading spinner

Sophos mounted counter-offensive operation to foil Chinese attackers Read More »

Google on scaling differential privacy across nearly three billion devices

Google on scaling differential privacy across nearly three billion devices 2024-10-31 at 15:03 By Mirko Zorz In this Help Net Security interview, Miguel Guevara, Product Manager, Privacy Safety and Security at Google, discusses the complexities involved in scaling differential privacy technology across large systems. He emphasizes the need to develop secure, private, and user-controlled products

React to this headline:

Loading spinner

Google on scaling differential privacy across nearly three billion devices Read More »

Lottie Player supply chain compromise: Sites, apps showing crypto scam pop-ups

Lottie Player supply chain compromise: Sites, apps showing crypto scam pop-ups 2024-10-31 at 14:38 By Zeljka Zorz A supply chain compromise involving Lottie Player, a widely used web component for playing site and app animations, has made popular decentralized finance apps show pop-ups urging users to connect their wallets, TradingView has reported. The pop-up (Source:

React to this headline:

Loading spinner

Lottie Player supply chain compromise: Sites, apps showing crypto scam pop-ups Read More »

Cynet enables 426% ROI in Forrester Total Economic Impact Study

Cynet enables 426% ROI in Forrester Total Economic Impact Study 2024-10-31 at 13:33 By Help Net Security Cost savings and business benefits were quantified in “The Total Economic Impact of Cynet All-in-One Security,” a commissioned study conducted by Forrester Consulting on behalf of Cynet in October 2024. The Total Economic Impact Study framework helps organizations

React to this headline:

Loading spinner

Cynet enables 426% ROI in Forrester Total Economic Impact Study Read More »

Scroll to Top