Category: HelpnetSecurity
ESET researchers have discovered NSPX30, a sophisticated implant used by a new China-aligned APT group, which they dubbed Blackwood. Blackwood…
All types of cyber threat actor are already using artificial intelligence (AI) to varying degrees, UK National Cyber Security Centre’s…
Automated Emulation is an open-source Terraform template designed to create a customizable, automated breach and attack simulation lab. The solution…
Business executives are worried about accidental internal staff error (71%) almost as much as they are worried about external threats…
In this Help Net Security interview, Nate Warfield, Director of Threat Research and Intelligence at Eclypsium, outlines the crucial tasks…
Global attack attempts more than doubled in 2023, increasing 104%, according to Armis. Blind spots and critical vulnerabilities are worsening,…
VIVOTEK introduces its cloud-based security service VORTEX, emphasizing a smarter and easier approach. Now featuring the latest addition – VORTEX…
Stack Identity has unveiled the expansion of the Identity Access Risk Management Platform with identity threat detection and response (ITDR)…
Proof-of-concept (PoC) exploit code for a critical vulnerability (CVE-2024-0204) in Fortra’s GoAnywhere MFT solution has been made public, sparking fears…
While a valuable tool in the cybersecurity toolkit, MFA is not immune to weaknesses. Read the “MFA Misconceptions” whitepaper to…
Security BSides Security BSides offers attendees an opportunity to engage and present their ideas actively. Characterized by its intensity, these…
Whether we’d like to admit it to ourselves or not, all humans harbor subconscious biases that powerfully influence our behavior….











