Category: HelpnetSecurity

Ransomware disrupts Indonesia's national data centre, LockBit gang claims US Federal Reserve breach
25
Jun
2024

Ransomware disrupts Indonesia’s national data centre, LockBit gang claims US Federal Reserve breach

Ransomware attackers wielding a LockBit variant dubbed Brain Cipher have disrupted a temporary national data center facility which supports the…

New security loophole allows spying on internet users' online activity
25
Jun
2024

New security loophole allows spying on internet users’ online activity

Researchers at Graz University of Technology were able to spy on users’ online activities simply by monitoring fluctuations in the…

Breaking down the numbers: Q2 2024 cybersecurity funding activity recap
25
Jun
2024

Breaking down the numbers: Q2 2024 cybersecurity funding activity recap

We present a list of selected cybersecurity companies that received funding during the second quarter of 2024 (Q2 2024). Alethea…

Zeek: Open-source network traffic analysis, security monitoring
25
Jun
2024

Zeek: Open-source network traffic analysis, security monitoring

Zeek is an open-source network analysis framework. Unlike an active security device such as a firewall, Zeek operates on a…

CISOs' new ally: Qualys CyberSecurity Asset Management 3.0
25
Jun
2024

CISOs’ new ally: Qualys CyberSecurity Asset Management 3.0

In this Help Net Security interview, Kunal Modasiya, VP of Product Management and Growth at Qualys, explores the key features,…

Guide to mitigating credential stuffing attacks
25
Jun
2024

Guide to mitigating credential stuffing attacks

We have a collective unaddressed weakness when it comes to basic cybersecurity. Out of the many reports circulating in the…

Open-source Rafel RAT steals info, locks Android devices, asks for ransom
24
Jun
2024

Open-source Rafel RAT steals info, locks Android devices, asks for ransom

The open-source Rafel RAT is being leveraged by multiple threat actors to compromise Android devices and, in some cases, to…

Cracking down on cybercrime: Who you gonna call?
24
Jun
2024

Cracking down on cybercrime: Who you gonna call?

As cybercrime continues to grow, law enforcement agencies worldwide face increased challenges in safeguarding organizations and individuals. In this article,…

Why are threat actors faking data breaches?
24
Jun
2024

Why are threat actors faking data breaches?

Earlier this year Europcar discovered a hacker selling info on its 50 million customers on the dark web. The European…

1 out of 3 breaches go undetected
24
Jun
2024

1 out of 3 breaches go undetected

Organizations continue to struggle in detecting breaches as they become more targeted and sophisticated, with more than 1 out of…

Week in review: CDK Global cyberattack, critical vCenter Server RCE fixed
23
Jun
2024

Week in review: CDK Global cyberattack, critical vCenter Server RCE fixed

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: The rise of SaaS security…

Intel-powered computers affected by serious firmware flaw (CVE-2024-0762)
21
Jun
2024

Intel-powered computers affected by serious firmware flaw (CVE-2024-0762)

A vulnerability (CVE-2024-0762) in the Phoenix SecureCore UEFI, which runs on various Intel processors, could be exploited locally to escalate…