Category: HelpnetSecurity

CISA confirms that SonicWall vulnerability is getting exploited (CVE-2024-40766)
10
Sep
2024

CISA confirms that SonicWall vulnerability is getting exploited (CVE-2024-40766)

The US Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2024-40766 – a recently fixed improper access control vulnerability affecting…

33 open-source cybersecurity solutions you didn’t know you needed
10
Sep
2024

33 open-source cybersecurity solutions you didn’t know you needed

Open-source cybersecurity tools provide transparency and flexibility, allowing users to examine and customize the source code to fit specific security…

How human-led threat hunting complements automation in detecting cyber threats
10
Sep
2024

How human-led threat hunting complements automation in detecting cyber threats

In this Help Net Security interview, Shane Cox, Director, Cyber Fusion Center at MorganFranklin Consulting, discusses the evolving methodologies and…

Zyxel fixes critical command injection flaw in EOL NAS devices (CVE-2024-6342)
10
Sep
2024

Zyxel fixes critical command injection flaw in EOL NAS devices (CVE-2024-6342)

Users of Zyxel network-attached storage (NAS) devices are urged to implement hotfixes addressing a critical and easily exploited command injection…

Free SaaS Pulse tool from Wing Security enhances SaaS security posture
10
Sep
2024

Free SaaS Pulse tool from Wing Security enhances SaaS security posture

Wing Security has released SaaS Pulse, a free tool for SaaS security management, offering organizations actionable insights and continuous oversight…

Huntress launches Managed SIEM, eliminating the complexity of traditional SIEMs
10
Sep
2024

Huntress launches Managed SIEM, eliminating the complexity of traditional SIEMs

Huntress announces the arrival of its new Managed SIEM solution, designed to serve small—to mid-sized enterprises and their MSP allies…

Tech stack uniformity has become a systemic vulnerability
10
Sep
2024

Tech stack uniformity has become a systemic vulnerability

Crashes due to faulty updates are nothing new; in fact, one reason IT teams often delay updates is their unreliability…

Veeam Backup & Replication RCE flaw may soon be leveraged by ransomware gangs (CVE-2024-40711)
09
Sep
2024

Veeam Backup & Replication RCE flaw may soon be leveraged by ransomware gangs (CVE-2024-40711)

CVE-2024-40711, a critical vulnerability affecting Veeam Backup & Replication (VBR), could soon be exploited by attackers to steal enterprise data….

End of an era: Security budget growth slows down
09
Sep
2024

End of an era: Security budget growth slows down

Amidst global economic and geopolitical uncertainty, markets are jittery, companies are spending frugally, and investors remain cautious, according to IANS…

Best practices for implementing the Principle of Least Privilege
09
Sep
2024

Best practices for implementing the Principle of Least Privilege

In this Help Net Security interview, Umaimah Khan, CEO of Opal Security, shares her insights on implementing the Principle of…

OpenZiti: Secure, open-source networking for your applications
09
Sep
2024

OpenZiti: Secure, open-source networking for your applications

OpenZiti is a free, open-source project that embeds zero-trust networking principles directly into applications. Example of an OpenZiti overlay network…

AI cybersecurity needs to be as multi-layered as the system it's protecting
09
Sep
2024

AI cybersecurity needs to be as multi-layered as the system it’s protecting

Cybercriminals are beginning to take advantage of the new malicious options that large language models (LLMs) offer them. LLMs make…