Category: HelpnetSecurity

Why cyberattacks mustn’t be kept secret
23
Jan
2024

Why cyberattacks mustn’t be kept secret

No company is immune to cyberattacks, but when the inevitable happens, too many companies still try to maintain a wall…

2024 brings new risks, with cyber incidents in the spotlight
23
Jan
2024

2024 brings new risks, with cyber incidents in the spotlight

Cyber incidents such as ransomware attacks, data breaches, and IT disruptions are the biggest worry for companies globally in 2024,…

Attackers can steal NTLM password hashes via calendar invites
22
Jan
2024

Attackers can steal NTLM password hashes via calendar invites

A recently patched vulnerability in Microsoft Outlook (CVE-2023-35636) that can be used by attackers to steal users’ NTLM v2 hashes…

New method to safeguard against mobile account takeovers
22
Jan
2024

New method to safeguard against mobile account takeovers

Computer science researchers have developed a new way to identify security weaknesses that leave people vulnerable to account takeover attacks,…

Tietoevry ransomware attack halts Swedish organizations
22
Jan
2024

Tietoevry ransomware attack halts Swedish organizations

Finnish IT software and service company Tietoevry has suffered a ransomware attack that affected several customers of one of its…

CloudFoxable: Open-source AWS penetration testing playground
22
Jan
2024

CloudFoxable: Open-source AWS penetration testing playground

CloudFoxable is a capture-the-flag (CTF) style learning platform you can deploy to your playground AWS account. It primarily targets current…

Without clear guidance, SEC’s new rule on incident reporting may be detrimental
22
Jan
2024

Without clear guidance, SEC’s new rule on incident reporting may be detrimental

The SEC has instituted a set of guidelines “requiring registrants to disclose material cybersecurity incidents they experience and to disclose…

The reality of hacking threats in connected car systems
22
Jan
2024

The reality of hacking threats in connected car systems

With the integration of sophisticated technologies like over-the-air updates and increased data connectivity, cars are no longer just modes of…

Global cyber inequity skyrockets - Help Net Security
22
Jan
2024

Global cyber inequity skyrockets – Help Net Security

There has been a sharp increase in cyber inequity globally, with 90% of executives warning that urgent action is needed…

Week in review: 10 cybersecurity frameworks you need to know, exploited Chrome zero-day fixed
21
Jan
2024

Week in review: 10 cybersecurity frameworks you need to know, exploited Chrome zero-day fixed

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Key elements for a successful…

Ivanti EPMM and MobileIron Core vulnerability is actively exploited, CISA confirms (CVE-2023-35082)
19
Jan
2024

Ivanti EPMM and MobileIron Core vulnerability is actively exploited, CISA confirms (CVE-2023-35082)

A previously patched critical vulnerability (CVE-2023-35082) affecting Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core is being actively exploited, the…

Unlocking GenAI's full potential through work reinvention
19
Jan
2024

Unlocking GenAI’s full potential through work reinvention

To achieve the full potential of AI, organizations must reinvent work, reshape the workforce and prepare workers, according to Accenture….