Category: HelpnetSecurity

Unlocking the power of cryptographic agility in a quantum world
11
Oct
2024

Unlocking the power of cryptographic agility in a quantum world

In this Help Net Security interview, Glen Leonhard, Director of Key Management at Cryptomathic, discusses the role of cryptographic agility…

Scammers target Airbnb and Booking.com users
11
Oct
2024

Scammers target Airbnb and Booking.com users

ESET researchers discovered that the organized scammer network Telekopye has expanded its operations to target users of popular accommodation booking…

How to setup passkeys in Apple Passwords app
11
Oct
2024

How to setup passkeys in Apple Passwords app

Beginning with iOS 18, iPadOS 18, macOS Sequoia, and visionOS 2, the Passwords app allows you to manage your passwords,…

Actively exploited Firefox zero-day fixed, update ASAP! (CVE-2024-9680)
10
Oct
2024

Actively exploited Firefox zero-day fixed, update ASAP! (CVE-2024-9680)

Mozilla has pushed out an emergency update for its Firefox and Firefox ESR browsers to fix a vulnerability (CVE-2024-9680) that…

Internet Archive data breach, defacement, and DDoS: Users' data compromised
10
Oct
2024

Internet Archive data breach, defacement, and DDoS: Users’ data compromised

The Internet Archive has suffered a data breach, leading to the compromise of email addresses, screen names and bcrypt password…

Qualys Enterprise TruRisk Management unifies asset inventory and risk factors
10
Oct
2024

Qualys Enterprise TruRisk Management unifies asset inventory and risk factors

Qualys launched the Risk Operations Center (ROC) with Enterprise TruRisk Management (ETM). The solution enables CISOs and business leaders to manage…

Investing in Privacy by Design for long-term compliance
10
Oct
2024

Investing in Privacy by Design for long-term compliance

In this Help Net Security interview, Bojan Belušić, Head of Information Security & IT Operations at Microblink, discusses the relationship…

Widening talent pool in cyber with on-demand contractors
10
Oct
2024

Widening talent pool in cyber with on-demand contractors

Filling roles within the cyber sector is an ongoing battle. The shortfall of workers risks creating a vicious cycle within…

Balancing legal frameworks and enterprise security governance
10
Oct
2024

Balancing legal frameworks and enterprise security governance

In this Help Net Security interview, Tom McAndrew, CEO at Coalfire, discusses the balance organizations must strike between legal compliance…

Consumers have trust issues regarding how AI collects their data
10
Oct
2024

Consumers have trust issues regarding how AI collects their data

Consumers worldwide are highly concerned about the information companies collect from them – especially when it’s used for AI, according…

What lies ahead for AI in cybersecurity
10
Oct
2024

What lies ahead for AI in cybersecurity

AI is becoming recognized for its potential to strengthen cybersecurity measures and tackle the skills gap across various sectors. Its…

Exploit code for critical GitLab auth bypass flaw released (CVE-2024-45409)
09
Oct
2024

Exploit code for critical GitLab auth bypass flaw released (CVE-2024-45409)

If you run a self-managed GitLab installation with configured SAML-based authentication and you haven’t upgraded it since mid-September, do it…