Category: HelpnetSecurity

Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
15
Jul
2024

Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)

The maintainers of the Exim mail transfer agent (MTA) have fixed a critical vulnerability (CVE-2024-39929) that currently affects around 1.5…

Risk related to non-human identities: Believe the hype, reject the FUD
15
Jul
2024

Risk related to non-human identities: Believe the hype, reject the FUD

The hype surrounding unmanaged and exposed non-human identities (NHIs), or machine-to-machine credentials – such as service accounts, system accounts, certificates…

Realm: Open-source adversary emulation framework
15
Jul
2024

Realm: Open-source adversary emulation framework

Realm is an open-source adversary emulation framework emphasizing scalability, reliability, and automation. It’s designed to handle engagements of any size….

Discover the growing threats to data security
15
Jul
2024

Discover the growing threats to data security

In this Help Net Security interview, Pranava Adduri, CEO at Bedrock Security, discusses how businesses can identify and prioritize their…

Pressure mounts for C-Suite executives to implement GenAI solutions
15
Jul
2024

Pressure mounts for C-Suite executives to implement GenAI solutions

87% of C-Suite executives feel under pressure to implement GenAI solutions at speed and scale, according to RWS. Despite these…

Week in review: RADIUS protocol critical vuln, Microsoft 0-day exploited for a year, AT&T breach
14
Jul
2024

Week in review: RADIUS protocol critical vuln, Microsoft 0-day exploited for a year, AT&T breach

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Hackers stole call, text records…

New infosec products of the week: July 12, 2024
14
Jul
2024

New infosec products of the week: July 12, 2024

Here’s a look at the most interesting products from the past week, featuring releases from AttackIQ, IT-Harvest, Pentera, Prompt Security,…

Top priorities for compliance leaders this year
14
Jul
2024

Top priorities for compliance leaders this year

Legal, compliance and privacy leaders list strengthening their personal impact on company strategy as their top priority for 2024, according…

Managing cyberattack fallout: Financial and operational damage
13
Jul
2024

Managing cyberattack fallout: Financial and operational damage

In this Help Net Security, Ashley Harrington, Director of Cybersecurity at Aspida, discusses the impact of cyberattack on business operations…

How to design a third-party risk management framework
13
Jul
2024

How to design a third-party risk management framework

Most organizations focus on securing routers, servers, firewalls, and other endpoints, but threats can also arise from unfamiliar sources such…

Info of 2,3+ million individuals stolen in Advance Auto Parts data breach
13
Jul
2024

Info of 2,3+ million individuals stolen in Advance Auto Parts data breach

Personal information of over 2,3 million individuals has been stolen by attackers as part of the massive data grab via…

Hackers stole call, text records of "nearly all" of AT&T's cellular customers
13
Jul
2024

Hackers stole call, text records of “nearly all” of AT&T’s cellular customers

Hackers leveraging stolen Snowflake account credentials have stolen records of calls and texts made by “nearly all” of AT&T’s cellular…