Log4J shows no sign of fading, spotted in 30% of CVE exploits
Organizations continue to run insecure protocols across their wide access networks (WAN), making it easier for cybercriminals to move across...
Read more →Organizations continue to run insecure protocols across their wide access networks (WAN), making it easier for cybercriminals to move across...
Read more →MITRE released EMB3D, a cybersecurity threat model for embedded devices. The model provides a cultivated knowledge base of cyber threats...
Read more →In this Help Net Security interview, Dana Wang, Chief Architect at OpenSSF, discusses the most significant barriers to improving open-source...
Read more →Developing responsible AI isn’t a straightforward proposition. On one side, organizations are striving to stay at the forefront of technological...
Read more →The increased use of AI further complicates CISO role as industries begin to realize the full potential of GenAI and...
Read more →Over a third of organizations had at least one known vulnerability in 2023, with nearly a quarter of those facing...
Read more →In this Help Net Security round-up, we present excerpts from previously recorded videos in which security experts talk about the...
Read more →The Ultimate Guide to the CISSP covers everything you need about the world’s premier cybersecurity leadership certification. Learn how CISSP...
Read more →Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Veeam fixes RCE flaw in...
Read more →Google has fixed a Chrome zero-day vulnerability (CVE-2024-4671), an exploit for which exists in the wild. About CVE-2024-4671 CVE-2024-4671 is...
Read more →93% of security leaders said public GenAI was in use across their respective organizations, and 91% reported using GenAI specifically...
Read more →People in certain professions, such as healthcare, law, and corporations, often rely on password protection when sending files via email,...
Read more →