Feb 21, 2024NewsroomSecure Communication / Anonymity End-to-end encrypted (E2EE) messaging app Signal said it’s piloting a new feature that allows…
Choosing the right SOC as a Service (SOCaaS) is crucial for businesses aiming to strengthen their cyber defenses. This decision…
NSA veteran Rob Joyce retires from the post of director, scheduled for the end of March, marking the culmination of…
In recent years, NSO Group made headlines amid allegations of developing espionage software intended for government use in combating criminal…
In 2024, API requests accounted for 57% of dynamic internet traffic around the globe, according to the Cloudflare 2024 API…
Feb 21, 2024NewsroomMalware / Cyber Threat Facebook advertisers in Vietnam are the target of a previously unknown information stealer dubbed…
Microsoft Exchange flaw CVE-2024-21410 could impact up to 97,000 servers Pierluigi Paganini February 21, 2024 Researchers from Shadowserver Foundation identified…
Threat actors target military technologies to gain a strategic advantage, access classified information, and compromise national security. Recently, Germany’s BfV…
VMware has issued an urgent advisory to administrators to remove a deprecated authentication plugin vulnerable to severe security threats. The…
1. Data Resilience: Data resilience refers to the ability of data to remain available and in-tact despite various challenges or…
At Help Net Security, we’ve been following the cybersecurity business landscape closely for the past 25 years. Through our Industry…
Feb 21, 2024NewsroomPhishing Attack / Information Warfare Cybersecurity researchers have unearthed a new influence operation targeting Ukraine that leverages spam…











