News

Future of wireless technology: Key predictions for 2024

Future of wireless technology: Key predictions for 2024 22/12/2023 at 08:05 By Help Net Security Wi-Fi technology continues to evolve in ways that anticipate the needs of consumers, businesses, enterprise verticals, smart cities, and service providers, according to the Wireless Broadband Alliance. Tiago Rodrigues, CEO of the Wireless Broadband Alliance, revealed predictions for 2024 and […]

React to this headline:

Loading spinner

Future of wireless technology: Key predictions for 2024 Read More »

11 GenAI cybersecurity surveys you should read

11 GenAI cybersecurity surveys you should read 22/12/2023 at 07:32 By Help Net Security Generative AI stands at the forefront of technological innovation, reshaping industries and unlocking new possibilities across various domains. However, as the integration of these technologies continues, a vigilant approach to ethical considerations and regulatory compliance is essential to ensure that the

React to this headline:

Loading spinner

11 GenAI cybersecurity surveys you should read Read More »

Tech workers fear being left unprepared for the future

Tech workers fear being left unprepared for the future 22/12/2023 at 07:02 By Help Net Security While tech workers want to learn and organizations are spending thousands of dollars per employee on learning technology, it is not translating into improved on-the-job performance for 4 out of 10 IT employees, according to Skillable. Inadequate training puts

React to this headline:

Loading spinner

Tech workers fear being left unprepared for the future Read More »

Product showcase: DCAP solution FileAuditor for data classification and access rights audit

Product showcase: DCAP solution FileAuditor for data classification and access rights audit 21/12/2023 at 14:02 By Help Net Security The concept of DCAP solutions was introduced by Gartner experts, as it was clear, that without such solutions information security (IS) specialists would not be able to cope with the protection of data in various silos

React to this headline:

Loading spinner

Product showcase: DCAP solution FileAuditor for data classification and access rights audit Read More »

Why data, AI, and regulations top the threat list for 2024

Why data, AI, and regulations top the threat list for 2024 21/12/2023 at 09:02 By Help Net Security The new year finds us confronted by a landscape characterized by political uncertainty, social fragmentation, escalating geopolitical tensions, and a turbulent macro-economic backdrop, making it crucial for security leaders to strategically prepare for the forthcoming challenges. Let’s

React to this headline:

Loading spinner

Why data, AI, and regulations top the threat list for 2024 Read More »

Are organizations moving away from passwords?

Are organizations moving away from passwords? 21/12/2023 at 07:53 By Help Net Security Passwordless authentication emerges as a calculated response, eliminating the inherent weaknesses of conventional passwords. At the heart of this evolution lies the deployment of passkeys—sophisticated cryptographic tools designed to authenticate users with a level of sophistication and reliability that transcends traditional methods.

React to this headline:

Loading spinner

Are organizations moving away from passwords? Read More »

86% of cyberattacks are delivered over encrypted channels

86% of cyberattacks are delivered over encrypted channels 21/12/2023 at 07:00 By Help Net Security Threats over HTTPS grew by 24% from 2022, underscoring the sophisticated nature of cybercriminal tactics that target encrypted channels, according to Zscaler. For the second year in a row, manufacturing was the industry most commonly targeted, with education and government

React to this headline:

Loading spinner

86% of cyberattacks are delivered over encrypted channels Read More »

8220 gang exploits old Oracle WebLogic vulnerability to deliver infostealers, cryptominers

8220 gang exploits old Oracle WebLogic vulnerability to deliver infostealers, cryptominers 20/12/2023 at 16:02 By Helga Labus The 8220 gang has been leveraging an old Oracle WebLogic Server vulnerability (CVE-2020-14883) to distribute malware, the Imperva Threat Research team has found. About 8220 Active since 2017, the 8220 gang has been known for deploying cryptocurrency miners

React to this headline:

Loading spinner

8220 gang exploits old Oracle WebLogic vulnerability to deliver infostealers, cryptominers Read More »

Citrix Bleed leveraged to steal data of 35+ million Comcast Xfinity customers

Citrix Bleed leveraged to steal data of 35+ million Comcast Xfinity customers 20/12/2023 at 13:32 By Helga Labus Telecommunications company Comcast has confirmed a breach that exposed personal information of more than 35.8 million of Xfinity customers. Exploiting Citrix Bleed to breach Xfinity CVE-2023-4966 (aka Citrix Bleed) – an information disclosure vulnerability in Citrix NetScaler

React to this headline:

Loading spinner

Citrix Bleed leveraged to steal data of 35+ million Comcast Xfinity customers Read More »

AI’s efficacy is constrained in cybersecurity, but limitless in cybercrime

AI’s efficacy is constrained in cybersecurity, but limitless in cybercrime 20/12/2023 at 09:47 By Help Net Security Bringing artificial intelligence into the cybersecurity field has created a vicious cycle. Cyber professionals now employ AI to enhance their tools and boost their detection and protection capabilities, but cybercriminals are also harnessing AI for their attacks. Security

React to this headline:

Loading spinner

AI’s efficacy is constrained in cybersecurity, but limitless in cybercrime Read More »

Product showcase: ImmuniWeb AI Platform

Product showcase: ImmuniWeb AI Platform 20/12/2023 at 08:31 By Help Net Security ImmuniWeb is a global application security company that currently serves over 1,000 customers from more than 50 countries. ImmuniWeb AI Platform has received numerous prestigious awards and industry recognitions for intelligent automation and acceleration of application security testing, which delivers better quality of

React to this headline:

Loading spinner

Product showcase: ImmuniWeb AI Platform Read More »

Balancing AI’s promise with privacy and intellectual property concerns

Balancing AI’s promise with privacy and intellectual property concerns 20/12/2023 at 07:31 By Help Net Security Organizations increasingly integrate AI technologies into their cybersecurity architectures to enhance detection, response, and mitigation capabilities. One of the key strengths of AI in cybersecurity lies in its ability to predict and prevent attacks before they occur. Powered by

React to this headline:

Loading spinner

Balancing AI’s promise with privacy and intellectual property concerns Read More »

Subdominator: Open-source tool for detecting subdomain takeovers

Subdominator: Open-source tool for detecting subdomain takeovers 20/12/2023 at 07:01 By Mirko Zorz Subdominator is a dependable and fast open-source command-line interface tool to identify subdomain takeovers. It boasts superior accuracy and reliability, offering improvements compared to other tools. “Initially, Subdominator was created internally because all the current subdomain takeover tools had gaps in their

React to this headline:

Loading spinner

Subdominator: Open-source tool for detecting subdomain takeovers Read More »

Law enforcement seizes ALPHV/Blackcat sites, offers decryptor to victims

Law enforcement seizes ALPHV/Blackcat sites, offers decryptor to victims 19/12/2023 at 19:04 By Zeljka Zorz The US Justice Department announced today a disruption campaign against the Blackcat/ALPHV ransomware group and let victims know that there is a decryptor they can use. FBI develops ALPHV/Blackcat decryptor Over the past 18 months, ALPHV/Blackcat has emerged as the

React to this headline:

Loading spinner

Law enforcement seizes ALPHV/Blackcat sites, offers decryptor to victims Read More »

Mr. Cooper breach exposes sensitive info of over 14 million customers

Mr. Cooper breach exposes sensitive info of over 14 million customers 19/12/2023 at 13:47 By Helga Labus Mortgage company Mr. Cooper has confirmed that personal information of over 14.6 million customers has been exposed in its October 2023 data breach. The breach “On October 31, 2023, Mr. Cooper detected suspicious activity in certain network systems,”

React to this headline:

Loading spinner

Mr. Cooper breach exposes sensitive info of over 14 million customers Read More »

SSH vulnerability exploitable in Terrapin attacks (CVE-2023-48795)

SSH vulnerability exploitable in Terrapin attacks (CVE-2023-48795) 19/12/2023 at 13:18 By Zeljka Zorz Security researchers have discovered a vulnerability (CVE-2023-48795) in the SSH cryptographic network protocol that could allow an attacker to downgrade the connection’s security by truncating the extension negotiation message. The Terrapin attack Terrapin is a prefix truncation attack targeting the SSH protocol.

React to this headline:

Loading spinner

SSH vulnerability exploitable in Terrapin attacks (CVE-2023-48795) Read More »

The impact of prompt injection in LLM agents

The impact of prompt injection in LLM agents 19/12/2023 at 08:31 By Help Net Security Prompt injection is, thus far, an unresolved challenge that poses a significant threat to Language Model (LLM) integrity. This risk is particularly alarming when LLMs are turned into agents that interact directly with the external world, utilizing tools to fetch

React to this headline:

Loading spinner

The impact of prompt injection in LLM agents Read More »

EMBA: Open-source security analyzer for embedded devices

EMBA: Open-source security analyzer for embedded devices 19/12/2023 at 08:02 By Mirko Zorz The EMBA open-source security analyzer is tailored as the central firmware analysis tool for penetration testers and product security groups. It assists throughout the security evaluation procedure, extracting firmware, conducting static and dynamic analysis through emulation, and creating a web-based report. EMBA

React to this headline:

Loading spinner

EMBA: Open-source security analyzer for embedded devices Read More »

Ransomware trends and recovery strategies companies should know

Ransomware trends and recovery strategies companies should know 19/12/2023 at 07:34 By Help Net Security Ransomware attacks can have severe consequences, causing financial losses, reputational damage, and operational disruptions. The methods used to deliver ransomware vary, including phishing emails, malicious websites, and exploiting vulnerabilities in software or operating systems. Cybercriminals often target organizations with weak

React to this headline:

Loading spinner

Ransomware trends and recovery strategies companies should know Read More »

Most cloud transformations are stuck in the middle

Most cloud transformations are stuck in the middle 19/12/2023 at 07:01 By Help Net Security The landscape of enterprise technology continues to evolve rapidly, with cloud transformation as a primary investment, according to HFS and IBM Consulting. Yet, most organizations have not yet experienced tangible business value from these efforts. Findings show that despite cloud

React to this headline:

Loading spinner

Most cloud transformations are stuck in the middle Read More »

Scroll to Top