Category: HelpnetSecurity

02
Mar
2023

Cyber resilience in focus: EU act to set strict standards

With the EU Cyber Resilience Act (CRA), the industry is dealing with one of the strictest regulatory requirements. Manufacturers, importers…

02
Mar
2023

BlackLotus UEFI bootkit disables Windows security mechanisms

ESET researchers have published the first analysis of a UEFI bootkit capable of circumventing UEFI Secure Boot, a critical platform…

02
Mar
2023

Moving target defense must keep cyber attackers guessing

A cybersecurity technique that shuffles network addresses like a blackjack dealer shuffles playing cards could effectively befuddle hackers gambling for…

02
Mar
2023

Uncovering the most pressing cybersecurity concerns for SMBs

In this Help Net Security video interview, James Edgar, CISO at Fleetcor, discusses what consequences SMBs are most concerned about…

02
Mar
2023

Don’t be fooled by a pretty icon, malicious apps hide in plain sight

Apps, whether for communication, productivity or gaming, are one of the biggest threats to mobile security, according to McAfee. The…

02
Mar
2023

Otorio partners with Compugen to enhance security for OT operations

Otorio and Compugen have formed a business partnership to protect customers against industrial cyber threats to OT environments. Through the…

02
Mar
2023

HCLSoftware and SolarWinds join forces to build AI-based telecom observability platform

HCLSoftware and SolarWinds are expanding their partnership to build an end-to-end 5G network observability platform from Cloud to RAN (Radio…

01
Mar
2023

Google Cloud Platform allows data exfiltration without a (forensic) trace

Attackers can exfiltrate company data stored in Google Cloud Platform (GCP) storage buckets without leaving obvious forensic traces of the…

01
Mar
2023

AlertEnterprise reveals Guardian AI Chatbot powered by OpenAI ChatGPT

AlertEnterprise revealed the launch of its Guardian AI Chatbot powered by OpenAI ChatGPT. The Guardian AI Chatbot is developed with…

01
Mar
2023

CIS Hardened Images List – Help Net Security

Your technology is always changing, and you often play catchup to secure it. This isn’t easy in the cloud when…

01
Mar
2023

DNS abuse: Advice for incident responders

What DNS abuse techniques are employed by cyber adversaries and which organizations can help incident responders and security teams detect,…

01
Mar
2023

Dormant accounts are a low-hanging fruit for attackers

Successful attacks on systems no longer require zero-day exploits, as attackers now focus on compromising identities through methods such as…