Category: HelpnetSecurity

Exploring the root causes of the cybersecurity skills gap
09
Jul
2024

Exploring the root causes of the cybersecurity skills gap

In this Help Net Security interview, Koma Gandy, VP of Leadership and Business at Skillsoft, addresses the critical aspects of…

TeamViewer: Network segmentation hobbled Midnight Blizzard's attack
08
Jul
2024

TeamViewer: Network segmentation hobbled Midnight Blizzard’s attack

TeamViewer, the company developing the popular remote access/control software with the same name, has finished the investigation into the breach…

Decryptor for DoNex, Muse, DarkRace, (fake) LockBit 3.0 ransomware released
08
Jul
2024

Decryptor for DoNex, Muse, DarkRace, (fake) LockBit 3.0 ransomware released

A cryptographic weakness in the DoNex ransomware and its previous incarnations – Muse, fake LockBit 3.0, and DarkRace – has…

How nation-state cyber attacks disrupt public services and undermine citizen trust
08
Jul
2024

How nation-state cyber attacks disrupt public services and undermine citizen trust

In this Help Net Security interview, Rob Greer, VP and GM of the Enterprise Security Group at Broadcom, discusses the…

July 2024 Patch Tuesday forecast: The end of an AV giant in the US
08
Jul
2024

July 2024 Patch Tuesday forecast: The end of an AV giant in the US

The US celebrated Independence Day last week, providing many with a long weekend leading into patch week. With summer vacations…

Monocle: Open-source LLM for binary analysis search
08
Jul
2024

Monocle: Open-source LLM for binary analysis search

Monocle is open-source tooling backed by a large language model (LLM) for performing natural language searches against compiled target binaries….

Organizations change recruitment strategies to find cyber talent
08
Jul
2024

Organizations change recruitment strategies to find cyber talent

An estimated 4 million professionals are needed to fill the growing cybersecurity workforce gap, according to Fortinet. At the same…

Week in review: A need for a DDoS response plan, human oversight in AI-enhanced software development
07
Jul
2024

Week in review: A need for a DDoS response plan, human oversight in AI-enhanced software development

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 4 key steps to building…

47% of corporate data stored in the cloud is sensitive
05
Jul
2024

47% of corporate data stored in the cloud is sensitive

As the use of the cloud continues to be strategically vital to many organizations, cloud resources have become the biggest…

Infostealing malware masquerading as generative AI tools
05
Jul
2024

Infostealing malware masquerading as generative AI tools

Over the past six months, there has been a notable surge in Android financial threats – malware targeting victims’ mobile…

99% of IoT exploitation attempts rely on previously known CVEs
05
Jul
2024

99% of IoT exploitation attempts rely on previously known CVEs

The explosion of Internet of Things (IoT) devices has brought about a wide range of security and privacy challenges, according…

Organizations weigh the risks and rewards of using AI
05
Jul
2024

Organizations weigh the risks and rewards of using AI

78% of organizations are tracking AI as an emerging risk while simultaneously adopting the technology themselves, according to AuditBoard. Organizations…