Category: HelpnetSecurity

The IT skills shortage situation is not expected to get any better
17
May
2024

The IT skills shortage situation is not expected to get any better

A growing IT skills shortage is impacting organizations in all industries and across all regions, according to IDC. In a…

Too many ICS assets are exposed to the public internet
17
May
2024

Too many ICS assets are exposed to the public internet

The enterprise attack surface is expanding in multiple ways, becoming more numerous and more specific, according to runZero. “Our research…

New infosec products of the week: May 17, 2024
17
May
2024

New infosec products of the week: May 17, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Calix, FireMon, ManageEngine, and OWASP…

Critical Git vulnerability allows RCE when cloning repositories with submodules (CVE-2024-32002)
16
May
2024

Critical Git vulnerability allows RCE when cloning repositories with submodules (CVE-2024-32002)

New versions of Git are out, with fixes for five vulnerabilities, the most critical (CVE-2024-32002) of which can be used…

Google fixes third exploited Chrome zero-day in a week (CVE-2024-4947)
16
May
2024

Google fixes third exploited Chrome zero-day in a week (CVE-2024-4947)

For the third time in the last seven days, Google has fixed a Chrome zero-day vulnerability (CVE-2024-4947) for which an…

Cloud security incidents make organizations turn to AI-powered prevention
16
May
2024

Cloud security incidents make organizations turn to AI-powered prevention

Cloud security incidents are alarmingly on the rise, with 61% of organizations reporting breaches within the last year, marking a…

OWASP dep-scan: Open-source security and risk audit tool
16
May
2024

OWASP dep-scan: Open-source security and risk audit tool

OWASP dep-scan is an open-source security and risk assessment tool that leverages information on vulnerabilities, advisories, and licensing restrictions for…

Is an open-source AI vulnerability next?
16
May
2024

Is an open-source AI vulnerability next?

AI has captured widespread interest and offers numerous benefits. However, its rapid advancement and widespread adoption raise concerns, especially for…

Ebury botnet compromises 400,000+ Linux servers
16
May
2024

Ebury botnet compromises 400,000+ Linux servers

ESET researchers released its deep-dive investigation into one of the most advanced server-side malware campaigns. It is still growing and…

Product showcase: Block ads, cookie pop-ups, trackers with CleanWeb
16
May
2024

Product showcase: Block ads, cookie pop-ups, trackers with CleanWeb

A study by PageFair revealed that ad blocker usage surged by 30% in 2016 alone, reflecting a growing public concern…

The critical role of IT staffing in strengthening cybersecurity
16
May
2024

The critical role of IT staffing in strengthening cybersecurity

Many organizations lack adequate IT staffing to combat cyber threats. A comprehensive approach to cybersecurity requires more than technical solutions….

How attackers deliver malware to Foxit PDF Reader users
15
May
2024

How attackers deliver malware to Foxit PDF Reader users

Threat actors are taking advantage of the flawed design of Foxit PDF Reader’s alerts to deliver malware via booby-trapped PDF…