Campaign URL
Copy
Twitter
0
tweets
Subscribe
Past Issues
RSS
Translate
English
العربية
Afrikaans
беларуская мова
български
català
中文(简体)
中文(繁體)
Hrvatski
Česky
Dansk
eesti keel
Nederlands
Suomi
Français
Deutsch
Ελληνική
हिन्दी
Magyar
Gaeilge
Indonesia
íslenska
Italiano
日本語
ភាសាខ្មែរ
한국어
македонски јазик
بهاس ملايو
Malti
Norsk
Polski
Português
Português - Portugal
Română
Русский
Español
Kiswahili
Svenska
עברית
Lietuvių
latviešu
slovenčina
slovenščina
српски
தமிழ்
ภาษาไทย
Türkçe
Filipino
украї́нська
Tiếng Việt
Latest information security news and research from Help Net Security
Help Net Security weekly newsletter
View in your browser
.
Securely Migrate to the Cloud with CIS Resources
Want to migrate to the cloud? CIS experts discuss key benefits, challenges, and methods for doing so along with CIS resources for securely making the move in a way that works for you.
Get Started Today
.
Latest news:
Global malicious activity targeting elections is skyrocketing
Week in review: AnyDesk phishing campaign targets employees, Microsoft fixes exploited zero-days
U.S. authorities disrupt Russian intelligence’s botnet
Gmail & Yahoo DMARC rollout: When cyber compliance gives a competitive edge
New infosec products of the week: February 16, 2024
Physical security is becoming a top priority in building design
Cyber threats cast shadow over 2024 elections
Battery maker Varta halts production after cyberattack
iOS users beware: GoldPickaxe trojan steals your facial data
AI outsourcing: A strategic guide to managing third-party risks
5 free digital forensics tools to boost your investigations
Understanding the tactics of stealthy hunter-killer malware
AI PC shipments are expected to surpass 167 million units by 2027
How are state-sponsored threat actors leveraging AI?
QNAP fixes OS command injection flaws affecting its NAS devices (CVE-2023-47218, CVE-2023-50358)
Corporate users getting tricked into downloading AnyDesk
We can’t risk losing staff to alert fatigue
Rise in cyberwarfare tactics fueled by geopolitical tensions
Fabric: Open-source framework for augmenting humans using AI
Cybercriminals get productivity boost with AI
Threat actors intensify focus on NATO member states
Microsoft patches two zero-days exploited by attackers (CVE-2024-21412, CVE-2024-21351)
Attackers injected novel DSLog backdoor into 670 vulnerable Ivanti devices (CVE-2024-21893)
Roundcube webmail XSS vulnerability exploited by attackers (CVE-2023-43770)
The future of cybersecurity: Anticipating changes with data analytics and automation
Protecting against AI-enhanced email threats
Product showcase: SearchInform Risk Monitor – next-gen DLP based insider threat mitigation platform
QR code attacks target organizations in ways they least expect
Critical Fortinet FortiOS flaw exploited in the wild (CVE-2024-21762)
Decryptor for Rhysida ransomware is available!
Integrating cybersecurity into vehicle design and manufacturing
Ransomware tactics evolve, become scrappier
SiCat: Open-source exploit finder
Videos:
Cybersecurity sectors adjust as DDoS attacks reach new heights
Collaboration at the core: The interconnectivity of ITOps and security
How to take control of personal data
How purple teaming enhances inter-team collaboration and effectiveness in cybersecurity
Hacking the flow: The consequences of compromised water systems
2024 cybersecurity outlook: A wave of global threats on the horizon
Industry news:
Cyberint Ransomania empowers organizations to proactively defend against ransomware attacks
BigID unveils access intelligence capabilities for security, risk, and AI compliance
NICE Actimize introduces generative AI-based solutions designed to fight financial crime
Mitek MiControl empowers financial institutions to detect check fraud
Infoblox SOC Insights reduces critical security operations challenges
Bitwarden adds event logs and self-hosting capabilities to its Passwordless.dev toolkit
CPS Insights helps organizations analyze and visualize their healthcare privacy data
KTrust introduces novel threat exposure approach for the Kubernetes era
Appdome unveils Geo Compliance suite to thwart spoofing and enhance mobile app security
LOKKER introduces a feature to notify users if their website breaches various privacy laws
VicOne xNexus offers contextualized insights into complex attack paths
Akto provides security assessments for GenAI models
Cyberhaven Linea AI protects vital corporate data
Sumsub Deepfake Detection combats AI-driven identity fraud
Sigma Software Studio unifies and streamlines software development processes
OneTrust platform enhancements accelerate AI adoption
CIS ESS Mobile offers visibility into blind spots on mobile devices
Visa extends its digital wallet capabilities to minimize the risk of fraud
Copyright © 2024 Astus d.o.o. (Help Net Security), All rights reserved.
Want to change how you receive these emails?
You can
update your preferences
or
unsubscribe from this list