Category: HelpnetSecurity

Blackwood APT delivers malware by hijacking legitimate software update requests
25
Jan
2024

Blackwood APT delivers malware by hijacking legitimate software update requests

ESET researchers have discovered NSPX30, a sophisticated implant used by a new China-aligned APT group, which they dubbed Blackwood. Blackwood…

AI expected to increase volume, impact of cyberattacks
25
Jan
2024

AI expected to increase volume, impact of cyberattacks

All types of cyber threat actor are already using artificial intelligence (AI) to varying degrees, UK National Cyber Security Centre’s…

Automated Emulation: Open-source breach and attack simulation lab
25
Jan
2024

Automated Emulation: Open-source breach and attack simulation lab

Automated Emulation is an open-source Terraform template designed to create a customizable, automated breach and attack simulation lab. The solution…

Fighting insider threats is tricky but essential work
25
Jan
2024

Fighting insider threats is tricky but essential work

Business executives are worried about accidental internal staff error (71%) almost as much as they are worried about external threats…

CISOs' role in identifying tech components and managing supply chains
25
Jan
2024

CISOs’ role in identifying tech components and managing supply chains

In this Help Net Security interview, Nate Warfield, Director of Threat Research and Intelligence at Eclypsium, outlines the crucial tasks…

45% of critical CVEs left unpatched in 2023
25
Jan
2024

45% of critical CVEs left unpatched in 2023

Global attack attempts more than doubled in 2023, increasing 104%, according to Armis. Blind spots and critical vulnerabilities are worsening,…

VIVOTEK VORTEX Connect empowers enterprise cloud transition
24
Jan
2024

VIVOTEK VORTEX Connect empowers enterprise cloud transition

VIVOTEK introduces its cloud-based security service VORTEX, emphasizing a smarter and easier approach. Now featuring the latest addition – VORTEX…

Stack Identity expands its plaform with ITDR to tackle shadow access and shadow identities
24
Jan
2024

Stack Identity expands its plaform with ITDR to tackle shadow access and shadow identities

Stack Identity has unveiled the expansion of the Identity Access Risk Management Platform with identity threat detection and response (ITDR)…

PoC exploit for easily exploitable Fortra GoAnywhere MFT vulnerability released (CVE-2024-0204)
24
Jan
2024

PoC exploit for easily exploitable Fortra GoAnywhere MFT vulnerability released (CVE-2024-0204)

Proof-of-concept (PoC) exploit code for a critical vulnerability (CVE-2024-0204) in Fortra’s GoAnywhere MFT solution has been made public, sparking fears…

Whitepaper: MFA misconceptions - Help Net Security
24
Jan
2024

Whitepaper: MFA misconceptions – Help Net Security

While a valuable tool in the cybersecurity toolkit, MFA is not immune to weaknesses. Read the “MFA Misconceptions” whitepaper to…

10 USA cybersecurity conferences you should visit in 2024
24
Jan
2024

10 USA cybersecurity conferences you should visit in 2024

Security BSides Security BSides offers attendees an opportunity to engage and present their ideas actively. Characterized by its intensity, these…

The effect of omission bias on vulnerability management
24
Jan
2024

The effect of omission bias on vulnerability management

Whether we’d like to admit it to ourselves or not, all humans harbor subconscious biases that powerfully influence our behavior….