Category: HelpnetSecurity

07
Mar
2023

Vulnerability in DJI drones may reveal pilot’s location

Serious security vulnerabilities have been identified in multiple DJI drones. These weaknesses had the potential to allow users to modify…

07
Mar
2023

Preventing corporate data breaches starts with remembering that leaks have real victims

When it comes to data breaches, organizations are generally informed about the risks and procedures for mitigating them. They can…

07
Mar
2023

Palo Alto Networks enhances cybersecurity capabilities with AI-powered ITDR module

Palo Alto Networks released new Identity Threat Detection and Response (ITDR) module for Cortex XSIAM, enabling customers to ingest user…

07
Mar
2023

Resecurity appoints Akash Rosen to lead digital forensics practice

Resecurity accelerates Digital Forensics & Incident Response Services portfolio with the newly appointed industry professional, Akash Rosen. Akash Rosen is…

07
Mar
2023

F5 and Visa join forces to enhance security throughout the customer experience

F5 and Visa join forces to enable merchants to securely reduce login friction for their customers. Customers expect seamless commerce…

06
Mar
2023

Business-grade routers compromised in low-key attack campaign

An unknown threat actor has discreetly compromised business-grade DrayTek routers in Europe, Latin and North America, equipping them with a…

06
Mar
2023

OneTrust Certification Automation helps businesses transcend traditional compliance barriers

OneTrust introduces OneTrust Certification Automation to the OneTrust ecosystem to help organizations navigate the complex and evolving regulatory landscape. OneTrust…

06
Mar
2023

Law enforcement teams score major win against DoppelPaymer ransomware gang

In a joint effort, the German Regional Police, Ukrainian National Police, Europol, Dutch Police, and FBI joined forces on February…

06
Mar
2023

PoC exploit for recently patched Microsoft Word RCE is public (CVE-2023-21716)

A PoC exploit for CVE-2023-21716, a critical RCE vulnerability in Microsoft Word that can be exploited when the user previews…

06
Mar
2023

XIoT risk and the vulnerability landscape

Recently, Claroty released its State of XIoT Security Report, which shares analyses of publicly disclosed vulnerabilities affecting operational technology (OT),…

06
Mar
2023

How to achieve and shore up cyber resilience in a recession

Today’s business leaders are grappling with two opposing challenges. On the one hand, present day global economic and recessionary pressures…

06
Mar
2023

6 cybersecurity and privacy Firefox add-ons you need to know about

In today’s digital age, cybersecurity and privacy have become major concerns for internet users. With the increase in cyber attacks…