Category: HelpnetSecurity

Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
16
Jan
2025

Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?

A threat actor has leaked configuration files (aka configs) for over 15,000 Fortinet Fortigate firewalls and associated admin and user…

New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)
16
Jan
2025

New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)

ESET researchers have identified a vulnerability (CVE-2024-7344) impacting most UEFI-based systems, which allows attackers to bypass UEFI Secure Boot. The…

Cisco AI Defense safeguards against the misuse of AI tools
16
Jan
2025

Cisco AI Defense safeguards against the misuse of AI tools

Cisco announced Cisco AI Defense, a pioneering solution to enable and safeguard AI transformation within enterprises. As AI technology advances,…

Webinar: Amplifying SIEM with AI-driven NDR for IT/OT convergence
16
Jan
2025

Webinar: Amplifying SIEM with AI-driven NDR for IT/OT convergence

Join cybersecurity leader Erwin Eimers from Sumitomo Chemicals Americas to explore how AI-driven Network Detection and Response (NDR) enhances SIEM…

How CISOs can elevate cybersecurity in boardroom discussions
16
Jan
2025

How CISOs can elevate cybersecurity in boardroom discussions

Ross Young is the CISO in residence at Team8 and the creator of the OWASP Threat and Safeguard Matrix (TaSM)….

Critical vulnerabilities remain unresolved due to prioritization gaps
16
Jan
2025

Critical vulnerabilities remain unresolved due to prioritization gaps

Fragmented data from multiple scanners, siloed risk scoring and poor cross-team collaboration are leaving organizations increasingly exposed to breaches, compliance…

Rsync vulnerabilities allow remote code execution on servers, patch quickly!
15
Jan
2025

Rsync vulnerabilities allow remote code execution on servers, patch quickly!

Six vulnerabilities have been fixed in the newest versions of Rsync (v3.4.0), two of which could be exploited by a…

Using cognitive diversity for stronger, smarter cyber defense
15
Jan
2025

Using cognitive diversity for stronger, smarter cyber defense

In this Help Net Security interview, Mel Morris, CEO of Corpora.ai, discusses how cognitive biases affect decision-making during cybersecurity incidents….

Contextal Platform: Open-source threat detection and intelligence
15
Jan
2025

Contextal Platform: Open-source threat detection and intelligence

Contextal Platform is an open-source cybersecurity solution for contextual threat detection and intelligence. Developed by the original authors of ClamAV,…

Cybersecurity is stepping into a new era of complexity
15
Jan
2025

Cybersecurity is stepping into a new era of complexity

Cybersecurity is entering a new era of complexity, according to the World Economic Forum’s Global Cybersecurity Outlook 2025 report. Growing…

Microsoft fixes actively exploited Windows Hyper-V zero-day flaws
15
Jan
2025

Microsoft fixes actively exploited Windows Hyper-V zero-day flaws

Microsoft has marked January 2025 Patch Tuesday with a hefty load of patches: 157 CVE-numbered security issues have been fixed…

Fortinet fixes FortiOS zero-day exploited by attackers for months (CVE-2024-55591)
14
Jan
2025

Fortinet fixes FortiOS zero-day exploited by attackers for months (CVE-2024-55591)

Fortinet has patched an authentication bypass vulnerability (CVE-2024-55591) affecting its FortiOS firewalls and FortiProxy web gateways that’s being exploited by…