Category: HelpnetSecurity

Critical GitHub Enterprise Server auth bypass flaw fixed (CVE-2024-6800)
22
Aug
2024

Critical GitHub Enterprise Server auth bypass flaw fixed (CVE-2024-6800)

A critical vulnerability (CVE-2024-6800) affecting all currently supported versions of GitHub Enterprise Server (GHES) may allow attackers to gain unrestricted…

New Chrome zero-day actively exploited, patch quickly! (CVE-2024-7971)
22
Aug
2024

New Chrome zero-day actively exploited, patch quickly! (CVE-2024-7971)

A new Chrome zero-day vulnerability (CVE-2024-7971) exploited by attackers in the wild has been fixed by Google. About CVE-2024-7971 CVE-2024-7971…

Android malware uses NFC to steal money at ATMs
22
Aug
2024

Android malware uses NFC to steal money at ATMs

ESET researchers uncovered NGate malware, which can relay data from victims’ payment cards via a malicious app installed on their…

LibreOffice 24.8: More privacy, interoperability improvements
22
Aug
2024

LibreOffice 24.8: More privacy, interoperability improvements

LibreOffice 24.8, the new major release of the free Windows, macOS, and Linux office suite, is now available. This is…

Why C-suite leaders are prime cyber targets
22
Aug
2024

Why C-suite leaders are prime cyber targets

Senior executives are prime targets for cybercriminals, with 72% of surveyed cybersecurity professionals in the US reporting that cyberattacks have…

A survival guide for data privacy in the age of federal inaction
22
Aug
2024

A survival guide for data privacy in the age of federal inaction

Things change fast in the world of data privacy. Just earlier this year, the question I was being asked most…

Most ransomware attacks occur between 1 a.m. and 5 a.m.
22
Aug
2024

Most ransomware attacks occur between 1 a.m. and 5 a.m.

There’s been an alarming increase in ransomware attacks over the past year, alongside significant shifts in the tactics and strategies…

GenAI models are easily compromised
22
Aug
2024

GenAI models are easily compromised

95% of cybersecurity experts express low confidence in GenAI security measures while red team data shows anyone can easily hack…

PostgreSQL databases under attack - Help Net Security
21
Aug
2024

PostgreSQL databases under attack – Help Net Security

Poorly protected PostgreSQL databases running on Linux machines are being compromised by cryptojacking attackers. The attack – observed by Aqua…

Entrust KeyControl as a Service provides organizations with control of their cryptographic keys
21
Aug
2024

Entrust KeyControl as a Service provides organizations with control of their cryptographic keys

Entrust unveiled KeyControl as a Service (KCaaS), providing organizations with control of their cryptographic keys while leveraging the benefits of…

RightCrowd introduces Mobile Credential Management feature
21
Aug
2024

RightCrowd introduces Mobile Credential Management feature

RightCrowd introduced Mobile Credential Management feature for RightCrowd SmartAccess. This solution transforms how organizations manage and control access, replacing traditional…

McAfee Deepfake Detector combats AI scams and misinformation
21
Aug
2024

McAfee Deepfake Detector combats AI scams and misinformation

McAfee launched McAfee Deepfake Detector, the latest addition to the company’s suite of AI-powered products. With AI-created videos, or deepfakes,…