Category: HelpnetSecurity

10
Aug
2023

Will AI kill cybersecurity jobs?

Some ten years ago, the authors of The Second Machine Age wrote that “computers and other digital advances are doing…

10
Aug
2023

Learning from past healthcare breaches to fortify future cybersecurity strategies

In the face of rising cyber threats, the healthcare sector has become a hotbed for cyberattacks. Given the gravity of…

10
Aug
2023

Private network adoption grows as enterprises seek greater control and security

Enterprises are turning to private networks to enhance security and resiliency, according to Spirent. “Private networks are emerging as a…

10
Aug
2023

37% of third-party applications have high-risk permissions

Email attacks have increased in both sophistication and volume since the start of the year, according to Abnormal Security. Examining…

09
Aug
2023

Vicarius vuln_GPT enables security teams to find and fix software vulnerabilities

Vicarius launched vuln_GPT, an LLM model trained to generate remediation scripts for software vulnerabilities in the race to find and…

09
Aug
2023

Sophos X-Ops showcases MDR and threat intelligence at Black Hat and DEF CON

Sophos has announced that Sophos X-Ops will lead three presentations at Black Hat and DEF CON, taking place this week…

09
Aug
2023

Downfall attacks can gather passwords, encryption keys from Intel processors

A variety of Intel Core processors and the devices using them are vulnerable to “Downfall”, a new class of attacks…

09
Aug
2023

Recent ransomware attacks share curiously similar tactics

A series of ransomware attacks made by different groups share curiously similar characteristics, according to Sophos. Sophos released new findings…

09
Aug
2023

SandboxAQ launches open-source meta-library of cryptographic algorithms

SandboxAQ launched Sandwich, an open-source framework that simplifies modern cryptography management and enables developers to steer their organizations towards cryptographic…

09
Aug
2023

Data exfiltration is now the go-to cyber extortion strategy

The abuse of zero-day and one-day vulnerabilities in the past six months led to a 143% increase in victims when…

09
Aug
2023

Why cybersecurity is a blue-collar job

Cybersecurity has witnessed exponential growth in recent years, fueled by the increasing sophistication of cyber threats. As the demand for…

09
Aug
2023

Using creative recruitment strategies to tackle the cybersecurity skills shortage

With the increasing complexity of cyber threats and the global shortage of cybersecurity experts, organizations are looking for creative approaches…