Category: HelpnetSecurity
Average response time accelerated from 29 to 19 days, from 2021 to 2022, with lessons from Log4j and other high-profile…
Researchers from several UK universities have proven that the recorded sounds of laptop keystrokes can be used to obtain sensitive…
Horizon3.ai researchers have published some details (but no PoC for now, thankfully!) about CVE-2023-39143, two vulnerabilities in PaperCut application servers…
The line between physical and digital safety continues to blur, making cybersecurity a universal concern. The intricacies of cybersecurity can…
In this Help Net Security interview, we delve into the world of cybersecurity with Michael Adams, the CISO at Zoom….
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Open-source penetration testing tool BloodHound…
Google is making it easier for users to remove personal contact information and personal, non-consensual explicit imagery from Google search…
The continued onslaught of phishing attacks, ransomware deployment, and other exploitation is forcing the community to pay closer attention to…
As the healthcare industry continues its rapid transformation through the adoption of digital technologies, it is also confronted with an…
Cybersecurity risk is distinct from other IT risk in that it has a thinking, adaptive, human opponent. IT generally must…
Here’s a look at the most interesting products from the past week, featuring releases from Forescout, Menlo Security, Qualys, Sonar,…
The Qualys Cloud Platform now includes new capabilities for assessing risks in first-party applications. Customers can “bring their own” assessment…