Category: HelpnetSecurity

Global roaming fraud losses to surpass $8 billion by 2028
04
Sep
2023

Global roaming fraud losses to surpass $8 billion by 2028

Losses from global roaming fraud are anticipated to exceed $8 billion by 2028; driven by the increase in bilateral roaming…

Championing cybersecurity regulatory affairs with Nidhi Gani
03
Sep
2023

Championing cybersecurity regulatory affairs with Nidhi Gani

Nidhi Gani is a seasoned regulatory affairs professional with over a decade of experience in cybersecurity, medical devices, and digital…

Week in review: 11 search engines for cybersecurity research, PoC for RCE in Juniper firewall released
03
Sep
2023

Week in review: 11 search engines for cybersecurity research, PoC for RCE in Juniper firewall released

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Adapting authentication to a cloud-centric…

How Ducktail capitalizes on compromised business, ad accounts
01
Sep
2023

How Ducktail capitalizes on compromised business, ad accounts

Quite some money can be made from selling compromised business and ad accounts on social media platforms, and the Ducktail…

Cybercriminals use research contests to create new attack methods
01
Sep
2023

Cybercriminals use research contests to create new attack methods

Adversary-sponsored research contests on cybercriminal forums focus on new methods of attack and evasion, according to Sophos. The contests mirror…

New infosec products of the week: September 1, 2023
01
Sep
2023

New infosec products of the week: September 1, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Ciphertex Data Security, ComplyCube, Fortinet,…

Understand the fine print of your cyber insurance policies
01
Sep
2023

Understand the fine print of your cyber insurance policies

A significant gap is emerging between insurance providers, as organizations skip the fine print and seek affordable and comprehensive coverage,…

Exploring the traits of effective chief audit executives
01
Sep
2023

Exploring the traits of effective chief audit executives

Chief audit executives (CAEs) have identified risk orientation, stakeholder management, and team leadership as the top three characteristics of the…

Cisco VPNs without MFA enabled hit by ransomware groups
31
Aug
2023

Cisco VPNs without MFA enabled hit by ransomware groups

Since March 2023 (and possibly even earlier), affiliates of the Akira and LockBit ransomware operators have been breaching organizations via…

Trojanized Signal, Telegram apps found on Google Play, Samsung Galaxy Store
31
Aug
2023

Trojanized Signal, Telegram apps found on Google Play, Samsung Galaxy Store

ESET researchers have identified two active campaigns targeting Android users, where the threat actors behind the tools for Telegram and…

The power of passive OS fingerprinting for accurate IoT device identification
31
Aug
2023

The power of passive OS fingerprinting for accurate IoT device identification

The number of IoT devices in enterprise networks and across the internet is projected to reach 29 billion by the…

What does optimal software security analysis look like?
31
Aug
2023

What does optimal software security analysis look like?

In this Help Net Security interview, Kevin Valk, co-CEO at Codean, discusses the consequences of relying solely on automated tools…