News

3 main tactics attackers use to bypass MFA

3 main tactics attackers use to bypass MFA 2023-12-26 at 07:09 By Help Net Security Notable security breaches have bypassed MFA to compromise taxi broker Uber, games company EA, and authentication business Okta, according to SE Labs. CISOs must bolster MFA protections SE Labs advised CISOs to step-up their efforts against attacks on systems protected […]

React to this headline:

Loading spinner

3 main tactics attackers use to bypass MFA Read More »

Verification roadblocks cause frustration for digital nomads

Verification roadblocks cause frustration for digital nomads 2023-12-26 at 06:36 By Help Net Security Digital nomads are expressing the most frustration when interacting with organizations offering services in the United States, according to Regula. This revelation comes as a surprise, given that the United States was the most frequented destination for the digital nomad community

React to this headline:

Loading spinner

Verification roadblocks cause frustration for digital nomads Read More »

Rising fintech trends for 2024: From A2A payments to GenAI in banking

Rising fintech trends for 2024: From A2A payments to GenAI in banking 2023-12-26 at 06:02 By Help Net Security The fintech market is undergoing a rapid shift, with the rise of new technologies, such as Open Finance, generative AI and A2A (Account-to-Account) payments having a major impact on business models, according to Juniper Research. This

React to this headline:

Loading spinner

Rising fintech trends for 2024: From A2A payments to GenAI in banking Read More »

Week in review: Terrapin SSH attack, Mr. Cooper breach

Week in review: Terrapin SSH attack, Mr. Cooper breach 2023-12-24 at 11:02 By Help Net Security Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Creating a formula for effective vulnerability prioritization In this Help Net Security interview, Michael Gorelik, CTO and Head of Malware Research at Morphisec, provides

React to this headline:

Loading spinner

Week in review: Terrapin SSH attack, Mr. Cooper breach Read More »

New infosec products of the week: December 22, 2023

New infosec products of the week: December 22, 2023 22/12/2023 at 09:03 By Help Net Security Here’s a look at the most interesting products from the past week, featuring releases from Argus Cyber Security, Cleafy, Kasada, and Stratus. Kasada launches advanced bot defense platform with evolving protection and attack insights Kasada launched its enhanced bot

React to this headline:

Loading spinner

New infosec products of the week: December 22, 2023 Read More »

Future of wireless technology: Key predictions for 2024

Future of wireless technology: Key predictions for 2024 22/12/2023 at 08:05 By Help Net Security Wi-Fi technology continues to evolve in ways that anticipate the needs of consumers, businesses, enterprise verticals, smart cities, and service providers, according to the Wireless Broadband Alliance. Tiago Rodrigues, CEO of the Wireless Broadband Alliance, revealed predictions for 2024 and

React to this headline:

Loading spinner

Future of wireless technology: Key predictions for 2024 Read More »

11 GenAI cybersecurity surveys you should read

11 GenAI cybersecurity surveys you should read 22/12/2023 at 07:32 By Help Net Security Generative AI stands at the forefront of technological innovation, reshaping industries and unlocking new possibilities across various domains. However, as the integration of these technologies continues, a vigilant approach to ethical considerations and regulatory compliance is essential to ensure that the

React to this headline:

Loading spinner

11 GenAI cybersecurity surveys you should read Read More »

Tech workers fear being left unprepared for the future

Tech workers fear being left unprepared for the future 22/12/2023 at 07:02 By Help Net Security While tech workers want to learn and organizations are spending thousands of dollars per employee on learning technology, it is not translating into improved on-the-job performance for 4 out of 10 IT employees, according to Skillable. Inadequate training puts

React to this headline:

Loading spinner

Tech workers fear being left unprepared for the future Read More »

Product showcase: DCAP solution FileAuditor for data classification and access rights audit

Product showcase: DCAP solution FileAuditor for data classification and access rights audit 21/12/2023 at 14:02 By Help Net Security The concept of DCAP solutions was introduced by Gartner experts, as it was clear, that without such solutions information security (IS) specialists would not be able to cope with the protection of data in various silos

React to this headline:

Loading spinner

Product showcase: DCAP solution FileAuditor for data classification and access rights audit Read More »

Why data, AI, and regulations top the threat list for 2024

Why data, AI, and regulations top the threat list for 2024 21/12/2023 at 09:02 By Help Net Security The new year finds us confronted by a landscape characterized by political uncertainty, social fragmentation, escalating geopolitical tensions, and a turbulent macro-economic backdrop, making it crucial for security leaders to strategically prepare for the forthcoming challenges. Let’s

React to this headline:

Loading spinner

Why data, AI, and regulations top the threat list for 2024 Read More »

Are organizations moving away from passwords?

Are organizations moving away from passwords? 21/12/2023 at 07:53 By Help Net Security Passwordless authentication emerges as a calculated response, eliminating the inherent weaknesses of conventional passwords. At the heart of this evolution lies the deployment of passkeys—sophisticated cryptographic tools designed to authenticate users with a level of sophistication and reliability that transcends traditional methods.

React to this headline:

Loading spinner

Are organizations moving away from passwords? Read More »

86% of cyberattacks are delivered over encrypted channels

86% of cyberattacks are delivered over encrypted channels 21/12/2023 at 07:00 By Help Net Security Threats over HTTPS grew by 24% from 2022, underscoring the sophisticated nature of cybercriminal tactics that target encrypted channels, according to Zscaler. For the second year in a row, manufacturing was the industry most commonly targeted, with education and government

React to this headline:

Loading spinner

86% of cyberattacks are delivered over encrypted channels Read More »

8220 gang exploits old Oracle WebLogic vulnerability to deliver infostealers, cryptominers

8220 gang exploits old Oracle WebLogic vulnerability to deliver infostealers, cryptominers 20/12/2023 at 16:02 By Helga Labus The 8220 gang has been leveraging an old Oracle WebLogic Server vulnerability (CVE-2020-14883) to distribute malware, the Imperva Threat Research team has found. About 8220 Active since 2017, the 8220 gang has been known for deploying cryptocurrency miners

React to this headline:

Loading spinner

8220 gang exploits old Oracle WebLogic vulnerability to deliver infostealers, cryptominers Read More »

Citrix Bleed leveraged to steal data of 35+ million Comcast Xfinity customers

Citrix Bleed leveraged to steal data of 35+ million Comcast Xfinity customers 20/12/2023 at 13:32 By Helga Labus Telecommunications company Comcast has confirmed a breach that exposed personal information of more than 35.8 million of Xfinity customers. Exploiting Citrix Bleed to breach Xfinity CVE-2023-4966 (aka Citrix Bleed) – an information disclosure vulnerability in Citrix NetScaler

React to this headline:

Loading spinner

Citrix Bleed leveraged to steal data of 35+ million Comcast Xfinity customers Read More »

AI’s efficacy is constrained in cybersecurity, but limitless in cybercrime

AI’s efficacy is constrained in cybersecurity, but limitless in cybercrime 20/12/2023 at 09:47 By Help Net Security Bringing artificial intelligence into the cybersecurity field has created a vicious cycle. Cyber professionals now employ AI to enhance their tools and boost their detection and protection capabilities, but cybercriminals are also harnessing AI for their attacks. Security

React to this headline:

Loading spinner

AI’s efficacy is constrained in cybersecurity, but limitless in cybercrime Read More »

Product showcase: ImmuniWeb AI Platform

Product showcase: ImmuniWeb AI Platform 20/12/2023 at 08:31 By Help Net Security ImmuniWeb is a global application security company that currently serves over 1,000 customers from more than 50 countries. ImmuniWeb AI Platform has received numerous prestigious awards and industry recognitions for intelligent automation and acceleration of application security testing, which delivers better quality of

React to this headline:

Loading spinner

Product showcase: ImmuniWeb AI Platform Read More »

Balancing AI’s promise with privacy and intellectual property concerns

Balancing AI’s promise with privacy and intellectual property concerns 20/12/2023 at 07:31 By Help Net Security Organizations increasingly integrate AI technologies into their cybersecurity architectures to enhance detection, response, and mitigation capabilities. One of the key strengths of AI in cybersecurity lies in its ability to predict and prevent attacks before they occur. Powered by

React to this headline:

Loading spinner

Balancing AI’s promise with privacy and intellectual property concerns Read More »

Subdominator: Open-source tool for detecting subdomain takeovers

Subdominator: Open-source tool for detecting subdomain takeovers 20/12/2023 at 07:01 By Mirko Zorz Subdominator is a dependable and fast open-source command-line interface tool to identify subdomain takeovers. It boasts superior accuracy and reliability, offering improvements compared to other tools. “Initially, Subdominator was created internally because all the current subdomain takeover tools had gaps in their

React to this headline:

Loading spinner

Subdominator: Open-source tool for detecting subdomain takeovers Read More »

Law enforcement seizes ALPHV/Blackcat sites, offers decryptor to victims

Law enforcement seizes ALPHV/Blackcat sites, offers decryptor to victims 19/12/2023 at 19:04 By Zeljka Zorz The US Justice Department announced today a disruption campaign against the Blackcat/ALPHV ransomware group and let victims know that there is a decryptor they can use. FBI develops ALPHV/Blackcat decryptor Over the past 18 months, ALPHV/Blackcat has emerged as the

React to this headline:

Loading spinner

Law enforcement seizes ALPHV/Blackcat sites, offers decryptor to victims Read More »

Mr. Cooper breach exposes sensitive info of over 14 million customers

Mr. Cooper breach exposes sensitive info of over 14 million customers 19/12/2023 at 13:47 By Helga Labus Mortgage company Mr. Cooper has confirmed that personal information of over 14.6 million customers has been exposed in its October 2023 data breach. The breach “On October 31, 2023, Mr. Cooper detected suspicious activity in certain network systems,”

React to this headline:

Loading spinner

Mr. Cooper breach exposes sensitive info of over 14 million customers Read More »

Scroll to Top