Category: HelpnetSecurity

Is an open-source AI vulnerability next?
16
May
2024

Is an open-source AI vulnerability next?

AI has captured widespread interest and offers numerous benefits. However, its rapid advancement and widespread adoption raise concerns, especially for…

Ebury botnet compromises 400,000+ Linux servers
16
May
2024

Ebury botnet compromises 400,000+ Linux servers

ESET researchers released its deep-dive investigation into one of the most advanced server-side malware campaigns. It is still growing and…

Product showcase: Block ads, cookie pop-ups, trackers with CleanWeb
16
May
2024

Product showcase: Block ads, cookie pop-ups, trackers with CleanWeb

A study by PageFair revealed that ad blocker usage surged by 30% in 2016 alone, reflecting a growing public concern…

The critical role of IT staffing in strengthening cybersecurity
16
May
2024

The critical role of IT staffing in strengthening cybersecurity

Many organizations lack adequate IT staffing to combat cyber threats. A comprehensive approach to cybersecurity requires more than technical solutions….

How attackers deliver malware to Foxit PDF Reader users
15
May
2024

How attackers deliver malware to Foxit PDF Reader users

Threat actors are taking advantage of the flawed design of Foxit PDF Reader’s alerts to deliver malware via booby-trapped PDF…

Ransomware statistics that reveal alarming rate of cyber extortion
15
May
2024

Ransomware statistics that reveal alarming rate of cyber extortion

In this article, you will find excerpts from various reports that offer statistics and insights about the current ransomware landscape….

Core security measures to strengthen privacy and data protection programs
15
May
2024

Core security measures to strengthen privacy and data protection programs

As privacy laws evolve globally, organizations face increasing complexity in adapting their data protection strategies to stay compliant. In this…

Cybersecurity jobs available right now: May 15, 2024
15
May
2024

Cybersecurity jobs available right now: May 15, 2024

Associate / Pentester (Red Team) – Cybersecurity Audit Siemens | Germany | Hybrid – View job details As an Associate…

Cybersecurity analysis exposes high-risk assets in power and healthcare sectors
15
May
2024

Cybersecurity analysis exposes high-risk assets in power and healthcare sectors

Traditional approaches to vulnerability management result in a narrow focus of the enterprise attack surface area that overlooks a considerable…

May 2024 Patch Tuesday: Microsoft fixes exploited zero-days (CVE-2024-30051, CVE-2024-30040)
14
May
2024

May 2024 Patch Tuesday: Microsoft fixes exploited zero-days (CVE-2024-30051, CVE-2024-30040)

For May 2024 Patch Tuesday, Microsoft has released fixes for 59 CVE-numbered vulnerabilities, including two zero-days (CVE-2024-30051, CVE-2024-30040) actively exploited…

BLint: Open-source tool to check the security properties of your executables
14
May
2024

BLint: Open-source tool to check the security properties of your executables

BLint is a Binary Linter designed to evaluate your executables’ security properties and capabilities, utilizing LIEF for its operations. From…

How a GRC consultant passed the CISSP exam in six weeks
14
May
2024

How a GRC consultant passed the CISSP exam in six weeks

Ask any IT security professional which certification they would consider to be the “gold standard” in terms of prestige, credibility,…