Cybersecurity experts have uncovered a wave of attacks exploiting vulnerabilities in Zyxel firewall to deploy the Helldown ransomware. This new…
Zyxel has announced awareness of active exploitation attempts by threat actors targeting their firewall products. This follows a detailed report…
HawkEye, also known as PredatorPain (Predator Pain), is a malware categorized as a keylogger, but over the years, it has…
Nov 29, 2024Ravie LakshmananCorporate Espionage / National Security A 59-year-old U.S. citizen who immigrated from the People’s Republic of China…
The global e-commerce boom has brought unparalleled convenience for consumers and massive revenue streams for businesses. Yet, this growth has…
A major cyberattack has disrupted operations at Wirral University Teaching Hospital (WUTH), part of the NHS Foundation Trust, leading to…
Black Basta ransomware, a notorious cybercrime group, has recently resurfaced in the news for its new and alarming method of…
In this Help Net Security interview, Steve Carter, CEO of Nucleus Security, discusses the ongoing challenges in vulnerability management, including…
Multiple regional conflicts, such as Russia’s continued invasion of Ukraine and the Israel-Hamas conflict, have resulted in a surge in…
A critical vulnerability in Microsoft’s Active Directory Certificate Services (AD CS) that could allow attackers to escalate privileges and potentially…
Here’s a look at the most interesting products from the past month, featuring releases from: Absolute, Arkose Labs, Atakama, BlackFog,…
The seven pillars of the Department of Defense (DOD) Zero Trust Reference Architecture provide a comprehensive framework for securing today’s…











