How Recorded Future finds ransomware victims before they get hit

Read more »

Internet Archive web historians target of hacktivist cyber attack

Read more »

Patch Tuesday: Internet Explorer Vulnerabilities Still Pose a Problem

Patch Tuesday brings patches for hundreds of vulnerabilities. Plus, Apple makes sure Sequoia plays nice with third-party security tools. Read more »

Internet Archive data breach, defacement, and DDoS: Users’ data compromised

The Internet Archive has suffered a data breach, leading to the compromise of email addresses, screen names and bcrypt password hashes of some 31 million users. The compromise was... Read more »

Qualys Enterprise TruRisk Management unifies asset inventory and risk factors

Qualys launched the Risk Operations Center (ROC) with Enterprise TruRisk Management (ETM). The solution enables CISOs and business leaders to manage cybersecurity risks in real time, transforming fragmented, siloed data... Read more »

Mozilla issued an urgent Firefox update to fix an actively exploited flaw

Mozilla released an urgent Firefox update to fix a critical use-after-free vulnerability actively exploited in ongoing attacks. Mozilla released an emergency security update for its Firefox browser to address... Read more »

Adaptiva improves collaboration between IT and security teams with vulnerability dashboards

Adaptiva announces the latest feature release for OneSite Patch: vulnerability dashboards. These new dashboards provide real-time visibility into Common Vulnerabilities and Exposures (CVEs) in the environment and patches that... Read more »

Palo Alto fixed critical flaws in PAN-OS firewalls that allow for full compromise of the devices

Palo Alto fixed critical flaws in PAN-OS firewalls, warning that attackers could chain these vulnerabilities to hijack the devices. Palo Alto Networks addressed multiple vulnerabilities that an attacker can... Read more »

Widening talent pool in cyber with on-demand contractors

Filling roles within the cyber sector is an ongoing battle. The shortfall of workers risks creating a vicious cycle within existing cyber teams: With fewer team members to spread... Read more »

Investing in Privacy by Design for long-term compliance

In this Help Net Security interview, Bojan Belušić, Head of Information Security & IT Operations at Microblink, discusses the relationship between Privacy by Design and regulatory frameworks like GDPR.... Read more »
Subscribe to our Newsletter