Category: HelpnetSecurity

22
Jan
2025

48,000+ internet-facing Fortinet firewalls still open to attack

Despite last week’s confirmation of and warnings about long-standing exploitation of CVE-2024-55591, a critical vulnerability affecting Fortinet Fortigate firewalls, too…

22
Jan
2025

China-aligned PlushDaemon APT compromises supply chain of Korean VPN

ESET researchers have uncovered a supply chain attack targeting a South Korean VPN provider, carried out by PlushDaemon, a newly…

22
Jan
2025

Acronis CISO on why backup strategies fail and how to make them resilient

In this Help Net Security interview, Gerald Beuchelt, CISO at Acronis, discusses common backup strategy pitfalls, reasons for backup failures,…

22
Jan
2025

Privacy professionals feel more stressed than ever

Despite progress made in privacy staffing and strategy alignment, privacy professionals are feeling increasingly stressed on the job within a…

22
Jan
2025

Cybersecurity books on ransomware you shouldn’t miss

This list of ransomware-focused cybersecurity books is tailored for professionals seeking practical insights and deeper knowledge. Covering technical strategies, real-world…

21
Jan
2025

Cybersecurity jobs available right now: January 21, 2025

CISO Sempra Infrastructure | USA | Hybrid – View job details As a CISO, you will develop and implement a…

21
Jan
2025

Scam Yourself attacks: How social engineering is evolving

We’ve entered a new era where verification must come before trust, and for good reason. Cyber threats are evolving rapidly,…

21
Jan
2025

Addressing the intersection of cyber and physical security threats

In this Help Net Security, Nicholas Jackson, Director of Cyber Operations at Bitdefender, discusses how technologies like AI, quantum computing,…

21
Jan
2025

Fleet: Open-source platform for IT and security teams

Fleet is an open-source platform for IT and security teams managing thousands of computers. It’s designed to work seamlessly with…

20
Jan
2025

CERT-UA warns against “security audit” requests via AnyDesk

Attackers are impersonating the Computer Emergency Response Team of Ukraine (CERT-UA) via AnyDesk to gain access to target computers. The…

20
Jan
2025

Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?

The twin cryptocurrency and digital identity revolutions are supposed to be building a better future, where anybody can take charge…

20
Jan
2025

AI-driven insights transform security preparedness and recovery

In this Help Net Security interview, Arunava Bag, CTO at Digitate, discusses how organizations can recover digital operations after an…