Campaign URL
Copy
Twitter
0
tweets
Subscribe
Past Issues
RSS
Translate
English
العربية
Afrikaans
беларуская мова
български
català
中文(简体)
中文(繁體)
Hrvatski
Česky
Dansk
eesti keel
Nederlands
Suomi
Français
Deutsch
Ελληνική
हिन्दी
Magyar
Gaeilge
Indonesia
íslenska
Italiano
日本語
ភាសាខ្មែរ
한국어
македонски јазик
بهاس ملايو
Malti
Norsk
Polski
Português
Português - Portugal
Română
Русский
Español
Kiswahili
Svenska
עברית
Lietuvių
latviešu
slovenčina
slovenščina
српски
தமிழ்
ภาษาไทย
Türkçe
Filipino
украї́нська
Tiếng Việt
PuTTY vulnerability can be exploited to recover private keys (CVE-2024-31497) -
April 22, 2024
View in your browser
.
Help Net Security weekly newsletter
Who’s using AI tools in your org?
Find out in minutes with
Nudge Security
. Discover all SaaS accounts ever created by anyone in your org, including AI tools. Get alerted as new AI tools are introduced, review vendor security profiles, and nudge users toward approved options.
Latest news:
Week in review: Palo Alto firewalls mitigation ineffective, PuTTY client vulnerable to key recovery attack
Ransomware in Q1 2024: Frequency, size of payments trending downwards, SMBs beware!
LastPass users targeted by vishing attackers
Protobom: Open-source software supply chain tool
51% of enterprises experienced a breach despite large security stacks
New infosec products of the week: April 19, 2024
Ivanti patches critical Avalanche flaw exploitable via a simple message (CVE-2024-29204)
Authorities take down LabHost, phishing-as-a-service platform
Cheap ransomware for sale on dark web marketplaces is changing the way hackers operate
Who owns customer identity?
92% of enterprises unprepared for AI security challenges
Bots dominate internet activity, account for nearly half of all traffic
Palo Alto firewalls: Public exploits, rising attacks, ineffective mitigation
Thinking outside the code: How the hacker mindset drives innovation
Cybersecurity jobs available right now: April 17, 2024
Damn Vulnerable RESTaurant: Open-source API service designed for learning
IT and security professionals demand more workplace flexibility
PuTTY vulnerability can be exploited to recover private keys (CVE-2024-31497)
Cisco Duo provider breached, SMS MFA logs compromised
New open-source project takeover attacks spotted, stymied
5 free red teaming resources to get you started
AI set to enhance cybersecurity roles, not replace them
31% of women in tech consider switching roles over the next year
A critical vulnerability in Delinea Secret Server allows auth bypass, admin access
eBook: Why CISSP?
How to protect IP surveillance cameras from Wi-Fi jamming
Geopolitical tensions escalate OT cyber attacks
Zarf: Open-source continuous software delivery on disconnected networks
Videos:
The key pillars of domain security
Enterprises face significant losses from mobile fraud
Understanding next-level cyber threats
Audio deepfakes: What they are, and the risks they present
Exposing the top cloud security threats
Expand your library with these cybersecurity books
Industry news:
Gurucul federated search provides insights into data that is not centralized
AuditBoard expands executive team to support the next phase of growth
Immuta launches Domains policy enforcement to improve security and governance for data owners
Redgate Monitor Enterprise prevents unauthorized access to sensitive information
SAS unveils products and services to help customers embrace AI
Vercara UltraEdge offers protection against internet-based threats
Tanium Automate reduces manual processes for repeatable tasks
GuidePoint Security introduces IoT Security Assessment
Sectigo SCM Pro automates certificate management
IDnow VideoIdent Flex blends AI technology with human interaction
Privacera adds access control and data filtering functionality for Vector DB/RAG
ShadowDragon Horizon enhancements help users conduct investigations from any device
Copyright © 2024 Astus d.o.o. (Help Net Security), All rights reserved.
Want to change how you receive these emails?
You can
update your preferences
or
unsubscribe from this list