Category: HelpnetSecurity

Critical GitLab flaw allows account takeover without user interaction, patch quickly! (CVE-2023-7028)
12
Jan
2024

Critical GitLab flaw allows account takeover without user interaction, patch quickly! (CVE-2023-7028)

A critical vulnerability in GitLab CE/EE (CVE-2023-7028) can be easily exploited by attackers to reset GitLab user account passwords. While…

LLM hype fades as enterprises embrace targeted AI models
12
Jan
2024

LLM hype fades as enterprises embrace targeted AI models

2023 was the year of AI enterprise adoption, with 55% of organizations adopting AI into their workflows, according to a…

Cloud security predictions for 2024
12
Jan
2024

Cloud security predictions for 2024

As we reflect on the cybersecurity landscape and the trajectories of threat vectors, it’s evident that we’re on the cusp…

New infosec products of the week: January 12, 2024
12
Jan
2024

New infosec products of the week: January 12, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Critical Start, Dasera, ID R&D,…

Ivanti Connect Secure zero-days exploited by attackers (CVE-2023-46805, CVE-2024-21887)
11
Jan
2024

Ivanti Connect Secure zero-days exploited by attackers (CVE-2023-46805, CVE-2024-21887)

Two zero-day vulnerabilities (CVE-2023-46805, CVE-2024-21887) in Ivanti Connect Secure VPN devices are under active exploitation by unknown attackers, Volexity researchers…

Critical Cisco Unity Connection flaw gives attackers root privileges. Patch now! (CVE-2024-20272)
11
Jan
2024

Critical Cisco Unity Connection flaw gives attackers root privileges. Patch now! (CVE-2024-20272)

Cisco has fixed a critical vulnerability (CVE-2024-20272) in Cisco Unity Connection that could allow an unauthenticated attacker to upload arbitrary…

Embracing offensive cybersecurity tactics for defense against dynamic threats
11
Jan
2024

Embracing offensive cybersecurity tactics for defense against dynamic threats

In this Help Net Security, Alexander Hagenah, Head of Cyber Controls at SIX, discusses the critical steps in creating effective…

Purple teaming and the role of threat categorization
11
Jan
2024

Purple teaming and the role of threat categorization

Organizations constantly work to ensure optimal threat detection and prevention across their systems. One question gets asked repeatedly: “Can we…

APIs are increasingly becoming attractive targets
11
Jan
2024

APIs are increasingly becoming attractive targets

APIs, a technology that underpins today’s most used sites and apps, are being leveraged by businesses more than ever—ultimately opening…

Hackers are targeting exposed MS SQL servers with Mimic ransomware
10
Jan
2024

Hackers are targeting exposed MS SQL servers with Mimic ransomware

Hackers are brute-forcing exposed MS SQL database servers to deliver Mimic ransomware, Securonix researchers are warning. About Mimic ransomware Mimic…

Top LLM vulnerabilities and how to mitigate the associated risk
10
Jan
2024

Top LLM vulnerabilities and how to mitigate the associated risk

As large language models (LLMs) become more prevalent, a comprehensive understanding of the LLM threat landscape remains elusive. But this…

Fly Catcher: Detect aircraft spoofing by monitoring for malicious signals
10
Jan
2024

Fly Catcher: Detect aircraft spoofing by monitoring for malicious signals

Fly Catcher is an open-source device that can detect aircraft spoofing by monitoring for malicious ADS-B signals in the 1090MHz…