Category: HelpnetSecurity

Attackers actively exploiting flaw(s) in Cleo file transfer software (CVE-2024-50623)
10
Dec
2024

Attackers actively exploiting flaw(s) in Cleo file transfer software (CVE-2024-50623)

Attackers are exploiting a vulnerability (CVE-2024-50623) in file transfer software by Cleo – LexiCo, VLTransfer, and Harmony – to gain…

21 years since its inception, GNU Shepherd 1.0.0 is released
10
Dec
2024

21 years since its inception, GNU Shepherd 1.0.0 is released

GNU Shepherd is a service manager designed to oversee the system’s daemons. It functions both as an “init” system (PID…

SecureAuth protects sensitive information with biometric continuous identity assurance
10
Dec
2024

SecureAuth protects sensitive information with biometric continuous identity assurance

SecureAuth is releasing biometric continuous identity assurance (BCIA). This ability is designed to safeguard a company’s sensitive information for the…

Cybersecurity jobs available right now: December 10, 2024
10
Dec
2024

Cybersecurity jobs available right now: December 10, 2024

Cloud Security Engineer Sendbird | USA | Hybrid – View job details As a Cloud Security Engineer, you will work…

Preventing data leakage in low-node/no-code environments
10
Dec
2024

Preventing data leakage in low-node/no-code environments

Low-code/no-code (LCNC) platforms enable application development by citizen developers, often generating “shadow engineering” projects that evade security oversight. While LCNC…

Strengthening security posture with comprehensive cybersecurity assessments
10
Dec
2024

Strengthening security posture with comprehensive cybersecurity assessments

In this Help Net Security interview, Phani Dasari, CISO at HGS, discusses key aspects of cybersecurity assessments, including effective tools…

Neosync: Open-source data anonymization, synthetic data orchestration
10
Dec
2024

Neosync: Open-source data anonymization, synthetic data orchestration

Neosync is an open-source, developer-centric solution designed to anonymize PII, generate synthetic data, and synchronize environments for improved testing and…

Update your OpenWrt router! Security issue made supply chain attack possible
09
Dec
2024

Update your OpenWrt router! Security issue made supply chain attack possible

A security issue that could have allowed attackers to serve malicious firmware images to users has been fixed by OpenWrt…

Microsoft: "Hack" this LLM-powered service and get paid
09
Dec
2024

Microsoft: “Hack” this LLM-powered service and get paid

Microsoft, in collaboration with the Institute of Science and Technology Australia and ETH Zurich, has announced the LLMail-Inject Challenge, a…

8Base hacked port operating company Luka Rijeka
09
Dec
2024

8Base hacked port operating company Luka Rijeka

Luka Rijeka, a company that offers maritime transport, port, storage of goods and forwarding services in Rijeka, Croatia, has been…

TPM 2.0: The new standard for secure firmware
09
Dec
2024

TPM 2.0: The new standard for secure firmware

Connected devices are better protected from cyberattacks and less likely to be compromised by errors thanks to the new TPM…

Who handles what? Common misconceptions about SaaS security responsibilities
09
Dec
2024

Who handles what? Common misconceptions about SaaS security responsibilities

In this Help Net Security interview, James Dolph, CISO at Guidewire, addresses common misconceptions about security responsibilities in cloud environments,…