Category: HelpnetSecurity
As artificial intelligence amplifies the sophistication and reach of phishing, vishing, and smishing attacks, understanding and managing human cyber risks…
Average response time accelerated from 29 to 19 days, from 2021 to 2022, with lessons from Log4j and other high-profile…
Researchers from several UK universities have proven that the recorded sounds of laptop keystrokes can be used to obtain sensitive…
Horizon3.ai researchers have published some details (but no PoC for now, thankfully!) about CVE-2023-39143, two vulnerabilities in PaperCut application servers…
The line between physical and digital safety continues to blur, making cybersecurity a universal concern. The intricacies of cybersecurity can…
In this Help Net Security interview, we delve into the world of cybersecurity with Michael Adams, the CISO at Zoom….
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Open-source penetration testing tool BloodHound…
Google is making it easier for users to remove personal contact information and personal, non-consensual explicit imagery from Google search…
The continued onslaught of phishing attacks, ransomware deployment, and other exploitation is forcing the community to pay closer attention to…
As the healthcare industry continues its rapid transformation through the adoption of digital technologies, it is also confronted with an…
Cybersecurity risk is distinct from other IT risk in that it has a thinking, adaptive, human opponent. IT generally must…
Here’s a look at the most interesting products from the past week, featuring releases from Forescout, Menlo Security, Qualys, Sonar,…