Campaign URL
Copy
Twitter
0
tweets
Subscribe
Past Issues
RSS
Translate
English
العربية
Afrikaans
беларуская мова
български
català
中文(简体)
中文(繁體)
Hrvatski
Česky
Dansk
eesti keel
Nederlands
Suomi
Français
Deutsch
Ελληνική
हिन्दी
Magyar
Gaeilge
Indonesia
íslenska
Italiano
日本語
ភាសាខ្មែរ
한국어
македонски јазик
بهاس ملايو
Malti
Norsk
Polski
Português
Português - Portugal
Română
Русский
Español
Kiswahili
Svenska
עברית
Lietuvių
latviešu
slovenčina
slovenščina
српски
தமிழ்
ภาษาไทย
Türkçe
Filipino
украї́нська
Tiếng Việt
Latest information security news and research from Help Net Security
Help Net Security weekly newsletter
View in your browser
.
Securely Migrate to the Cloud with CIS Resources
Want to migrate to the cloud? CIS experts discuss key benefits, challenges, and methods for doing so along with CIS resources for securely making the move in a way that works for you.
Get Started Today
.
Latest news:
Whitepaper: MFA misconceptions
Week in review: Windows Event Log zero-day, exploited critical Jenkins RCE flaw
New infosec products of the week: February 2, 2024
NIS2 Directive raises stakes for security leaders
DDoS attack power skyrockets to 1.6 Tbps
Crowdsourced security is not just for tech companies anymore
EU adopts first cybersecurity certification scheme for safer tech
Malicious logins from suspicious infrastructure fuel identity-based incidents
FritzFrog botnet exploits Log4Shell, PwnKit vulnerabilities
FBI disrupts Chinese botnet used for targeting US critical infrastructure
Threat actor used Vimeo, Ars Technica to serve second-stage malware
Zero trust implementation: Plan, then execute, one step at a time
Custom rules in security tools can be a game changer for vulnerability detection
CVEMap: Open-source tool to query, browse and search CVEs
Payment fraud is hitting organizations harder than ever before
Infosec products of the month: January 2024
A zero-day vulnerability (and PoC) to blind defenses relying on Windows event logs
Free ransomware recovery tool White Phoenix now has a web version
Does CVSS 4.0 solve the exploitability problem?
Proactive cybersecurity: A strategic approach to cost efficiency and crisis management
How to make developers accept DevSecOps
Cybercriminals replace familiar tactics to exfiltrate sensitive data
Database management enters a new era of complexity
Self-managed GitLab installations should be patched again (CVE-2024-0402)
Hundreds of network operators’ credentials found circulating in Dark Web
Great security or great UX? Both, please
Faction: Open-source pentesting report generation and collaboration framework
Unlocking sustainable security practices with secure coding education
Balancing AI benefits with security and privacy risks in healthcare
Critical Jenkins RCE flaw exploited in the wild. Patch now! (CVE-2024-23897)
Third-party risk management best practices and why they matter
Prioritizing cybercrime intelligence for effective decision-making in cybersecurity
Global critical infrastructure faces relentless cyber activity
Cybercriminals embrace smarter strategies, less effort
Videos:
Unpacking the challenges of AI cybersecurity
Ransomware recap 2023 highlights cybersecurity crisis
Exploring the intersection of network security and modern technologies
Industry news:
Graylog API Security enables organizations to identify and classify APIs
Qualys enhances CyberSecurity Asset Management to discover risky unmanaged devices
Secureworks Threat Score reduces alert noise and time to respond
Dynatrace provides end-to-end observability of AI applications
BackBox introduces ZTNO to automate zero trust security for network operations
Experian Fraud Protect enables automotive dealers to detect and prevent fraud
Vade uses generative AI to enhance spear-phishing detection
Kentik AI improves network monitoring and observability
Jetico updates BCWipe Total WipeOut to meet the NIST hard drive wipe requirements
VikingCloud THOR AI offers real-time interactive analytics
Omada introduces real time identity governance
ProcessUnity unveils all-in-one platform for third-party risk management
SentinelOne launches threat hunting capabilities in its WatchTower and WatchTower Pro
Siren launches AI-Powered search with mobile access for front line officers
NordVPN Link Checker protects users from malicious websites
HaystackID enhances Protect Analytics AI Suite to strengthen data analysis
Juniper Networks introduces AI-Native Networking Platform
Copyright © 2024 Astus d.o.o. (Help Net Security), All rights reserved.
Want to change how you receive these emails?
You can
update your preferences
or
unsubscribe from this list