Category: HelpnetSecurity

Microsoft patches two zero-days exploited by attackers (CVE-2024-21412, CVE-2024-21351)
13
Feb
2024

Microsoft patches two zero-days exploited by attackers (CVE-2024-21412, CVE-2024-21351)

On February 2024 Patch Tuesday, Microsoft has delivered fixes for 72 CVE-numbered vulnerabilities, including two zero-days (CVE-2024-21412, CVE-2024-21351) that are…

Attackers injected novel DSLog backdoor into 670 vulnerable Ivanti devices (CVE-2024-21893)
13
Feb
2024

Attackers injected novel DSLog backdoor into 670 vulnerable Ivanti devices (CVE-2024-21893)

Hackers are actively exploiting a vulnerability (CVE-2024-21893) in Ivanti Connect Secure, Policy Secure and Neurons for ZTA to inject a…

Roundcube webmail XSS vulnerability exploited by attackers (CVE-2023-43770)
13
Feb
2024

Roundcube webmail XSS vulnerability exploited by attackers (CVE-2023-43770)

CVE-2023-43770, a vulnerability in the Roundcube webmail software that has been fixed in September 2023, is being exploited by attackers…

QR code attacks target organizations in ways they least expect
13
Feb
2024

QR code attacks target organizations in ways they least expect

QR code attacks, or “quishing” attacks, have emerged as a popular tactic among cybercriminals, with no signs of slowing down,…

The future of cybersecurity: Anticipating changes with data analytics and automation
13
Feb
2024

The future of cybersecurity: Anticipating changes with data analytics and automation

In this Help Net Security interview, Mick Baccio, Staff Security Strategist at Splunk SURGe, discusses the future of cybersecurity, emphasizing…

Protecting against AI-enhanced email threats
13
Feb
2024

Protecting against AI-enhanced email threats

Generative AI based on large language models (LLMs) has become a valuable tool for individuals and businesses, but also cybercriminals….

Product showcase: SearchInform Risk Monitor – next-gen DLP based insider threat mitigation platform
13
Feb
2024

Product showcase: SearchInform Risk Monitor – next-gen DLP based insider threat mitigation platform

Basically, DLP systems are aimed at prevention of data leaks, and in real-life mode they monitor and block (if required)…

CIS ESS Mobile offers visibility into blind spots on mobile devices
12
Feb
2024

CIS ESS Mobile offers visibility into blind spots on mobile devices

While most organizations focus cybersecurity efforts on fortifying their networks, the mobile devices connected to them often remain vulnerable. In…

Decryptor for Rhysida ransomware is available!
12
Feb
2024

Decryptor for Rhysida ransomware is available!

Files encrypted by Rhysida ransomware can be successfully decrypted, due to a implementation vulnerability discovered by Korean researchers and leveraged…

Integrating cybersecurity into vehicle design and manufacturing
12
Feb
2024

Integrating cybersecurity into vehicle design and manufacturing

In this Help Net Security interview, Yaron Edan, CISO at REE Automotive, discusses the cybersecurity landscape of the automotive industry,…

SiCat: Open-source exploit finder - Help Net Security
12
Feb
2024

SiCat: Open-source exploit finder – Help Net Security

SiCat is an open-source tool for exploit research designed to source and compile information about exploits from open channels and…

Ransomware tactics evolve, become scrappier
12
Feb
2024

Ransomware tactics evolve, become scrappier

As we enter 2024, ransomware remains the most significant cyberthreat facing businesses, according to Malwarebytes. Malwarebytes reveals that the United…