Jane Devry
08
Aug
2024

The three pillars of the next generation in data security: PostgreSQL, zero trust and web3

The technologies that will enable optimised data security already exist, but businesses are resting on their laurels. Data gathered by…

SSHamble: Open-source security testing of SSH services
08
Aug
2024

SSHamble: Open-source security testing of SSH services

runZero published new research on Secure Shell (SSH) exposures and unveiled a corresponding open-source tool, SSHamble. This tool helps security…

Rhysida Ransomware gang claims the hack of Bayhealth Hospital
08
Aug
2024

Rhysida Ransomware gang claims the hack of Bayhealth Hospital

Rhysida Ransomware group claims to have breached Bayhealth Hospital in Delaware Pierluigi Paganini August 08, 2024 The Rhysida Ransomware group…

GhostWrite Vulnerability Let Hackers Read & Write Any Part of The Computer’s Memory
08
Aug
2024

GhostWrite Vulnerability Allows Hackers to Access Computer Memory

A group of cybersecurity researchers at CISPA Helmholtz Center for Information Security recently identified three major security vulnerabilities in five…

Naveen Goud
08
Aug
2024

INC Ransomware targets McLaren Health Care Hospitals

The perpetrators behind recent ransomware attacks seem to lack any sense of empathy or concern for human lives, as their…

Traceeshark: Open-source plugin for Wireshark
08
Aug
2024

Traceeshark: Open-source plugin for Wireshark

Traceeshark is a plugin for Wireshark that enables security practitioners to quickly investigate security incidents. It enhances the capabilities of…

New BlackSuit Ransomware Threat Evolve: FBI, CISA Warn
08
Aug
2024

New BlackSuit Ransomware Threat Evolve: FBI, CISA Warn

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have jointly issued an advisory to…

How network segmentation can strengthen visibility in OT networks
08
Aug
2024

How network segmentation can strengthen visibility in OT networks

What role does the firewall play in the protection of operational technology (OT) networks and systems? Many would say that…

AI security 2024: Key insights for staying ahead of threats
08
Aug
2024

AI security 2024: Key insights for staying ahead of threats

In this Help Net Security interview, Kojin Oshiba, co-founder of Robust Intelligence, discusses his journey from academic research to addressing…

Ransomware operators continue to innovate
08
Aug
2024

Ransomware operators continue to innovate

Ransomware groups continue to refine their craft, building and scaling business models that resemble legitimate corporate enterprises, according to Rapid7….

Starlink's rise draws more ACCC attention
08
Aug
2024

Starlink’s rise draws more ACCC attention – Telco/ISP

Starlink’s rising customer numbers in Australia has the competition watchdog wanting regular updates on its subscriber growth. The Australian Competition…

National Public Data Hacked
08
Aug
2024

2.9 Billion Users Personal Data Stolen

In one of the largest data breaches in history, the personal information of nearly 3 billion individuals has been stolen…