How to get started with ongoing configuration assessments

There’s an old adage in business: if you’re not measuring something, you can’t manage it. These days, information technology (IT) and information security professionals know this all too well,... Read more »

ThreatConnect empowers security teams to operationalize intelligence requirements

ThreatConnect announced its new Intelligence Requirement capability. This new capability strengthens ThreatConnect’s TI Ops Platform by allowing customers to define, manage, and track their intelligence requirements (IRs), priority intelligence... Read more »

Keystroke sounds can betray passwords

Researchers from several UK universities have proven that the recorded sounds of laptop keystrokes can be used to obtain sensitive user data such as passwords with a high accuracy.... Read more »

Hunters partners with Kudelski Security to help companies strengthen their cyber resilience

To help companies strengthen their cyber resilience and revolutionize their security operations, Hunters and Kudelski Security have entered a strategic partnership, cybersecurity company Hunters announced. As part of the... Read more »

PaperCut fixes bug that can lead to RCE, patch quickly! (CVE-2023-39143)

Horizon3.ai researchers have published some details (but no PoC for now, thankfully!) about CVE-2023-39143, two vulnerabilities in PaperCut application servers that could be exploited by unauthenticated attackers to execute... Read more »

8 free cybersecurity documentaries you can watch right now

The line between physical and digital safety continues to blur, making cybersecurity a universal concern. The intricacies of cybersecurity can often feel esoteric, leaving many outside the industry feeling... Read more »

Zoom CISO Michael Adams discusses cybersecurity threats, solutions, and the future

In this exclusive Help Net Security interview, we delve into the world of cybersecurity with Michael Adams, the CISO at Zoom. Adams analyzes how organizations grapple with the effects... Read more »

Budget constraints threaten cybersecurity in government bodies

Government organizations are attractive targets for threat actors whose motivations may be geopolitical, financial, or disruption, according to BlackBerry. Because threat actors may include private individuals, small groups, or... Read more »

Navigating the gray zone of ransomware payment practices

Ransomware remains a lucrative tool for cybercriminals as attackers continue to target a wide array of businesses. In response to this growing threat, an increasing number of organizations are... Read more »

Unraveling the importance of software supply chain security

The software supply chain encompasses the entire lifecycle of a software product, from its conception and development to its distribution and deployment. It involves a complex network of suppliers,... Read more »
Subscribe to our Newsletter