Despite economic uncertainty, organizations are prioritizing SaaS security investments

In this Help Net Security video, Maor Bin, CEO and Co-Founder of Adaptive Shield, discusses the key findings of their recent annual SaaS Security Survey Report, conducted in partnership... Read more »

Confidential AI: Enabling secure processing of sensitive data

In this Help Net Security interview, Anand Pashupathy, VP & GM, Security Software & Services Division at Intel, explains how Intel’s approach to confidential computing, particularly at the silicon... Read more »

EvilVideo, a Telegram Android zero-day allowed sending malicious APKs disguised as videos

EvilVideo is a zero-day in the Telegram App for Android that allowed attackers to send malicious APK payloads disguised as videos. ESET researchers discovered a zero-day exploit named EvilVideo... Read more »

Heeler Security raises $8.5 million to boost application security

Heeler Security announced the successful closing of an $8.5 million Seed Series funding round, led by Norwest Venture Partners with significant participation from Storm Ventures. “Application security requires a... Read more »

Microsoft releases tool to speed up recovery of systems borked by CrowdStrike update

By now, most people are aware of – or have been personally affected by – the largest IT outage the world have ever witnessed, courtesy of a defective update... Read more »

SocGholish malware used to spread AsyncRAT malware

The JavaScript downloader SocGholish (aka FakeUpdates) is being used to deliver the AsyncRAT and the legitimate open-source project BOINC. Huntress researchers observed the JavaScript downloader malware SocGholish (aka FakeUpdates)... Read more »

NCA cracks digitalstress DDoS-for-hire operation

Read more »

Surfshark vs CyberGhost (2024): Which VPN Is Better?

Which VPN is better, Surfshark or CyberGhost? Compare these VPNs with our guide and find out which one is best for you. Read more »

NCSC: Beware of criminal CrowdStrike opportunists

Read more »

CrowdStrike chaos shows risks of concentrated ‘big IT’

Read more »
Subscribe to our Newsletter