Category: HelpnetSecurity

Rise in cyberwarfare tactics fueled by geopolitical tensions
14
Feb
2024

Rise in cyberwarfare tactics fueled by geopolitical tensions

In this Help Net Security interview, Matt Shelton, Head of Threat Research and Analysis at Google Cloud, discusses the latest…

We can’t risk losing staff to alert fatigue
14
Feb
2024

We can’t risk losing staff to alert fatigue

The oft-quoted Chinese military strategist Sun Tzu famously claimed: “If you know the enemy and know yourself, you need not…

Cybercriminals get productivity boost with AI
14
Feb
2024

Cybercriminals get productivity boost with AI

While AI technology has the potential to streamline and automate processes for beneficial outcomes, it also comes with an equal…

Microsoft patches two zero-days exploited by attackers (CVE-2024-21412, CVE-2024-21351)
13
Feb
2024

Microsoft patches two zero-days exploited by attackers (CVE-2024-21412, CVE-2024-21351)

On February 2024 Patch Tuesday, Microsoft has delivered fixes for 72 CVE-numbered vulnerabilities, including two zero-days (CVE-2024-21412, CVE-2024-21351) that are…

Attackers injected novel DSLog backdoor into 670 vulnerable Ivanti devices (CVE-2024-21893)
13
Feb
2024

Attackers injected novel DSLog backdoor into 670 vulnerable Ivanti devices (CVE-2024-21893)

Hackers are actively exploiting a vulnerability (CVE-2024-21893) in Ivanti Connect Secure, Policy Secure and Neurons for ZTA to inject a…

Roundcube webmail XSS vulnerability exploited by attackers (CVE-2023-43770)
13
Feb
2024

Roundcube webmail XSS vulnerability exploited by attackers (CVE-2023-43770)

CVE-2023-43770, a vulnerability in the Roundcube webmail software that has been fixed in September 2023, is being exploited by attackers…

QR code attacks target organizations in ways they least expect
13
Feb
2024

QR code attacks target organizations in ways they least expect

QR code attacks, or “quishing” attacks, have emerged as a popular tactic among cybercriminals, with no signs of slowing down,…

The future of cybersecurity: Anticipating changes with data analytics and automation
13
Feb
2024

The future of cybersecurity: Anticipating changes with data analytics and automation

In this Help Net Security interview, Mick Baccio, Staff Security Strategist at Splunk SURGe, discusses the future of cybersecurity, emphasizing…

Protecting against AI-enhanced email threats
13
Feb
2024

Protecting against AI-enhanced email threats

Generative AI based on large language models (LLMs) has become a valuable tool for individuals and businesses, but also cybercriminals….

Product showcase: SearchInform Risk Monitor – next-gen DLP based insider threat mitigation platform
13
Feb
2024

Product showcase: SearchInform Risk Monitor – next-gen DLP based insider threat mitigation platform

Basically, DLP systems are aimed at prevention of data leaks, and in real-life mode they monitor and block (if required)…

CIS ESS Mobile offers visibility into blind spots on mobile devices
12
Feb
2024

CIS ESS Mobile offers visibility into blind spots on mobile devices

While most organizations focus cybersecurity efforts on fortifying their networks, the mobile devices connected to them often remain vulnerable. In…

Decryptor for Rhysida ransomware is available!
12
Feb
2024

Decryptor for Rhysida ransomware is available!

Files encrypted by Rhysida ransomware can be successfully decrypted, due to a implementation vulnerability discovered by Korean researchers and leveraged…