Sonatype Nexus Repository Manager Hit by RCE & XSS Vulnerability
18
Nov
2024

Sonatype Nexus Repository Manager Hit by RCE & XSS Vulnerability

Sonatype, the company behind the popular Nexus Repository Manager, has issued security advisories addressing two critical vulnerabilities affecting Nexus Repository…

How and where to report cybercrime: What you need to know
18
Nov
2024

How and where to report cybercrime: What you need to know

Cybercrime reporting mechanisms vary across the globe, with each country offering different methods for citizens to report cybercrime, including online…

Pegasus Spyware via Whatsapp Exploit
18
Nov
2024

NSO Group Exploited WhatsApp to Install Pegasus Spyware Even After Meta’s Lawsuit

Nov 18, 2024Ravie LakshmananMobile Security / Spyware Legal documents released as part of an ongoing legal tussle between Meta’s WhatsApp…

APT Group DONOT
18
Nov
2024

APT Group DONOT Targets Pakistan’s Maritime And Defense

A new hacker collective, known as the APT group DONOT, has targeted critical sectors of Pakistan’s economy, specifically the maritime…

Transforming code scanning and threat detection with GenAI
18
Nov
2024

Transforming code scanning and threat detection with GenAI

In this Help Net Security interview, Stuart McClure, CEO of Qwiet AI, discusses the evolution of code scanning practices, highlighting…

Cyber security bill recommended for 'urgent' parliamentary approval
18
Nov
2024

Cyber security bill recommended for ‘urgent’ parliamentary approval – Security

Proposed legislation compelling businesses to disclose their ransomware payments to the government has been recommended for “urgent” parliamentary approval. Introduced…

Samba AD Vulnerability Let Attackers Escalate Privilege
18
Nov
2024

Samba AD Vulnerability Let Attackers Escalate Privilege

A critical vulnerability in Samba Active Directory (AD) implementations has been discovered that could allow attackers to escalate privileges and…

GeoVision 0-Day Vulnerability Exploited in the Wild
18
Nov
2024

GeoVision 0-Day Vulnerability Exploited in the Wild

Cybersecurity researchers have detected the active exploitation of a zero-day vulnerability in GeoVision devices, which the manufacturer no longer supports….

Navigating the compliance labyrinth: A CSO’s guide to scaling security
18
Nov
2024

Navigating the compliance labyrinth: A CSO’s guide to scaling security

Imagine navigating a labyrinth where the walls constantly shift, and the path ahead is obscured by fog. If this brings…

18
Nov
2024

Future Face of Tech Leadership: Mastering the ‘Trifecta of Disruption’ – Partner Content

“Disruption is redefining tech leadership, with regulation emerging as a critical new force,” according to Logicalis CEO Robert Bailkoski.  Bailkoski…

Evaluating GRC tools - Help Net Security
18
Nov
2024

Evaluating GRC tools – Help Net Security

According to Gartner, the broad range of pricing for government, risk, and compliance (GRC) tools requires enterprise risk management (ERM)…

WordPress Plugin Vulnerability
18
Nov
2024

Critical WordPress Plugin Vulnerability Exposes Over 4 Million Sites

Nov 18, 2024Ravie LakshmananVulnerability / Website Security A critical authentication bypass vulnerability has been disclosed in the Really Simple Security…