Category: HelpnetSecurity

Inside the 2024 CWE Top 25: Trends, surprises, and persistent challenges
02
Dec
2024

Inside the 2024 CWE Top 25: Trends, surprises, and persistent challenges

In this Help Net Security interview, Alec Summers, Project Leader for the CVE Program at MITRE, shares his insights on…

5 reasons to double down on network security
02
Dec
2024

5 reasons to double down on network security

Cybersecurity programs have evolved significantly over the past few decades. The advent of cloud computing shattered the conventional corporate perimeter,…

Week in review: Exploitable flaws in corporate VPN clients, malware loader created with gaming engine
01
Dec
2024

Week in review: Exploitable flaws in corporate VPN clients, malware loader created with gaming engine

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Researchers reveal exploitable flaws in…

The effect of compliance requirements on vulnerability management strategies
29
Nov
2024

The effect of compliance requirements on vulnerability management strategies

In this Help Net Security interview, Steve Carter, CEO of Nucleus Security, discusses the ongoing challenges in vulnerability management, including…

AI-based tools designed for criminal activity are in high demand
29
Nov
2024

AI-based tools designed for criminal activity are in high demand

Multiple regional conflicts, such as Russia’s continued invasion of Ukraine and the Israel-Hamas conflict, have resulted in a surge in…

Infosec products of the month: November 2024
29
Nov
2024

Infosec products of the month: November 2024

Here’s a look at the most interesting products from the past month, featuring releases from: Absolute, Arkose Labs, Atakama, BlackFog,…

VPN vulnerabilities, weak credentials fuel ransomware attacks
28
Nov
2024

VPN vulnerabilities, weak credentials fuel ransomware attacks

Attackers leveraging virtual private network (VPN) vulnerabilities and weak passwords for initial access contributed to nearly 30% of ransomware attacks,…

Crypto companies are losing ground to deepfake attacks
28
Nov
2024

Crypto companies are losing ground to deepfake attacks

The crypto sector stands out as the only surveyed industry where deepfake fraud surpasses traditional document fraud in prevalence, according…

Ransomware payments are now a critical business decision
28
Nov
2024

Ransomware payments are now a critical business decision

Despite the efforts of law enforcement agencies to stop and bring to justice those responsible for ransomware attacks, the situation…

Cybercriminals used a gaming engine to create undetectable malware loader
27
Nov
2024

Cybercriminals used a gaming engine to create undetectable malware loader

Threat actors are using an ingenious new way for covertly delivering malware to a wide variety of operating systems and…

ESET researchers analyze first UEFI bootkit for Linux systems
27
Nov
2024

ESET researchers analyze first UEFI bootkit for Linux systems

ESET Research has discovered the first UEFI bootkit designed for Linux systems, named Bootkitty by its creators. Researchers believe this…

QScanner: Linux command-line utility for scanning container images, conducting SCA
27
Nov
2024

QScanner: Linux command-line utility for scanning container images, conducting SCA

QScanner is a Linux command-line utility tailored for scanning container images and performing Software Composition Analysis (SCA). It is compatible…