Category: HelpnetSecurity

Lack of visibility into cloud access policies leaves enterprises flying blind
24
Aug
2023

Lack of visibility into cloud access policies leaves enterprises flying blind

Fragmented access policies are top security concern in multi-cloud environments, with more than 75% of enterprises reporting they do not…

Webinar: The external attack surface & AI's role in proactive security
24
Aug
2023

Webinar: The external attack surface & AI’s role in proactive security

The enterprise perimeter is now a massively decentralized IT landscape characterized by large-scale adoption of cloud platforms, digital services, and…

Attackers exploited WinRAR zero-day for months to steal money from brokers (CVE-2023-38831)
23
Aug
2023

Attackers exploited WinRAR zero-day for months to steal money from brokers (CVE-2023-38831)

Financially-motivated attackers have exploited a zero-day vulnerability in WinRAR (CVE-2023-38831) to trick traders into installing malware that would allow them…

Bogus OfficeNote app delivers XLoader macOS malware
23
Aug
2023

Bogus OfficeNote app delivers XLoader macOS malware

A new macOS-specific variant of the well known XLoader malware is being delivered disguised as the “OfficeNote” app. “Multiple submissions…

Surge in identity crime victims reporting suicidal thoughts
23
Aug
2023

Surge in identity crime victims reporting suicidal thoughts

Identity theft can have great financial impact on the victims, but the experienced emotional, physical and psychological impact can be…

Open redirect flaws increasingly exploited by phishers
23
Aug
2023

Open redirect flaws increasingly exploited by phishers

Phishing attacks using open redirect flaws are on the rise again, according to Kroll’s Cyber Threat Intelligence (CTI) team, which…

Security Onion 2.4: Free, open platform for defenders gets huge update
23
Aug
2023

Security Onion 2.4: Free, open platform for defenders gets huge update

Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It has been…

Cybercriminals turn to AI to bypass modern email security measures
23
Aug
2023

Cybercriminals turn to AI to bypass modern email security measures

Cybercriminals employ artificial intelligence (AI) to create complex email threats like phishing and business email compromise (BEC) attacks, while modern…

Anticipating the next wave of IoT cybersecurity challenges
23
Aug
2023

Anticipating the next wave of IoT cybersecurity challenges

In this Help Net Security interview, Roland Atoui, Managing Director at Red Alert Labs, discusses the intricacies of transitioning from…

Large-scale breaches overshadow decline in number of healthcare data incidents
23
Aug
2023

Large-scale breaches overshadow decline in number of healthcare data incidents

While H1 2023 saw an encouraging decrease in the overall number of data breaches impacting healthcare organizations, it was overshadowed…

Juniper Networks fixes flaws leading to RCE in firewalls and switches
22
Aug
2023

Juniper Networks fixes flaws leading to RCE in firewalls and switches

Juniper Networks has fixed four vulnerabilities (CVE-2023-36844, CVE-2023-36845, CVE-2023-36846, CVE-2023-36847) in Junos OS that, if chained together, could allow attackers…

IT's rising role in physical security technology
22
Aug
2023

IT’s rising role in physical security technology

As the adoption of cloud-based and mobile-access security systems continues to increase among both new and established businesses, the lines…