Category: HelpnetSecurity

Citrix Bleed leveraged to steal data of 35+ million Comcast Xfinity customers
20
Dec
2023

Citrix Bleed leveraged to steal data of 35+ million Comcast Xfinity customers

Telecommunications company Comcast has confirmed a breach that exposed personal information of more than 35.8 million of Xfinity customers. Exploiting…

AI’s efficacy is constrained in cybersecurity, but limitless in cybercrime
20
Dec
2023

AI’s efficacy is constrained in cybersecurity, but limitless in cybercrime

Bringing artificial intelligence into the cybersecurity field has created a vicious cycle. Cyber professionals now employ AI to enhance their…

Product showcase: ImmuniWeb AI Platform
20
Dec
2023

Product showcase: ImmuniWeb AI Platform

ImmuniWeb is a global application security company that currently serves over 1,000 customers from more than 50 countries. ImmuniWeb AI…

Balancing AI's promise with privacy and intellectual property concerns
20
Dec
2023

Balancing AI’s promise with privacy and intellectual property concerns

Organizations increasingly integrate AI technologies into their cybersecurity architectures to enhance detection, response, and mitigation capabilities. One of the key…

Subdominator: Open-source tool for detecting subdomain takeovers
20
Dec
2023

Subdominator: Open-source tool for detecting subdomain takeovers

Subdominator is a dependable and fast open-source command-line interface tool to identify subdomain takeovers. It boasts superior accuracy and reliability,…

Law enforcement seizes ALPHV/Blackcat sites, offers decryptor to victims
19
Dec
2023

Law enforcement seizes ALPHV/Blackcat sites, offers decryptor to victims

The US Justice Department announced today a disruption campaign against the Blackcat/ALPHV ransomware group and let victims know that there…

Mr. Cooper breach exposes sensitive info of over 14 million customers
19
Dec
2023

Mr. Cooper breach exposes sensitive info of over 14 million customers

Mortgage company Mr. Cooper has confirmed that personal information of over 14.6 million customers has been exposed in its October…

SSH vulnerability exploitable in Terrapin attacks (CVE-2023-48795)
19
Dec
2023

SSH vulnerability exploitable in Terrapin attacks (CVE-2023-48795)

Security researchers have discovered a vulnerability (CVE-2023-48795) in the SSH cryptographic network protocol that could allow an attacker to downgrade…

Most cloud transformations are stuck in the middle
19
Dec
2023

Most cloud transformations are stuck in the middle

The landscape of enterprise technology continues to evolve rapidly, with cloud transformation as a primary investment, according to HFS and…

The impact of prompt injection in LLM agents
19
Dec
2023

The impact of prompt injection in LLM agents

Prompt injection is, thus far, an unresolved challenge that poses a significant threat to Language Model (LLM) integrity. This risk…

EMBA: Open-source security analyzer for embedded devices
19
Dec
2023

EMBA: Open-source security analyzer for embedded devices

The EMBA open-source security analyzer is tailored as the central firmware analysis tool for penetration testers and product security groups….

Ransomware trends and recovery strategies companies should know
19
Dec
2023

Ransomware trends and recovery strategies companies should know

Ransomware attacks can have severe consequences, causing financial losses, reputational damage, and operational disruptions. The methods used to deliver ransomware…