Category: HelpnetSecurity

CrushFTP zero-day exploited by attackers, upgrade immediately! (CVE-2024-4040)
23
Apr
2024

CrushFTP zero-day exploited by attackers, upgrade immediately! (CVE-2024-4040)

A vulnerability (CVE-2024-4040) in enterprise file transfer solution CrushFTP is being exploited by attackers in a targeted fashion, according to…

The rising influence of AI on the 2024 US election
23
Apr
2024

The rising influence of AI on the 2024 US election

We stand at a crossroads for election misinformation: on one side our election apparatus has reached a higher level of…

People doubt their own ability to spot AI-generated deepfakes
23
Apr
2024

People doubt their own ability to spot AI-generated deepfakes

23% of Americans said they recently came across a political deepfake they later discovered to be fake, according to McAfee….

10 colleges and universities shaping the future of cybersecurity education
23
Apr
2024

10 colleges and universities shaping the future of cybersecurity education

Institutions featured on this list often provide undergraduate and graduate degrees, courses, as well as certificate programs tailored to meet…

Behavioral patterns of ransomware groups are changing
23
Apr
2024

Behavioral patterns of ransomware groups are changing

Q1 saw substantial shifts in activity from some of the most prolific Ransomware-as-a-Service (RaaS) groups, according to GuidePoint Security. RaaS…

Trend Micro launches AI-driven cyber risk management capabilities
22
Apr
2024

Trend Micro launches AI-driven cyber risk management capabilities

Trend Micro unveiled AI-driven cyber risk management capabilities across its entire flagship platform, Trend Vision One. This seamlessly integrates more…

The first steps of establishing your cloud security strategy
22
Apr
2024

The first steps of establishing your cloud security strategy

In this article, we’ll identify some first steps you can take to establish your cloud security strategy. We’ll do so…

Cloud Console Cartographer: Open-source tool helps security teams transcribe log activity
22
Apr
2024

Cloud Console Cartographer: Open-source tool helps security teams transcribe log activity

Cloud Console Cartographer is an open-source tool that maps noisy log activity into highly consolidated, succinct events to help security…

How to optimize your bug bounty programs
22
Apr
2024

How to optimize your bug bounty programs

In this Help Net Security interview, Roy Davis, Manager – Vulnerability Management & Bug Bounty at Zoom, discusses the role…

Uncertainty is the most common driver of noncompliance
22
Apr
2024

Uncertainty is the most common driver of noncompliance

Most compliance leaders tend to focus on building an ethical culture in their organizations to improve employee behavior, but it…

Week in review: Palo Alto firewalls mitigation ineffective, PuTTY client vulnerable to key recovery attack
21
Apr
2024

Week in review: Palo Alto firewalls mitigation ineffective, PuTTY client vulnerable to key recovery attack

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Palo Alto firewalls: Public exploits,…

Ransomware in Q1 2024: Frequency, size of payments trending downwards, SMBs beware!
19
Apr
2024

Ransomware in Q1 2024: Frequency, size of payments trending downwards, SMBs beware!

More organizations hit by ransomware gangs are starting to realize that it doesn’t pay to pay up: “In Q1 2024,…