New Vulnerabilities in ConnectWise ScreenConnect Massively Exploited by Attackers

One vulnerability impacting ConnectWise ScreenConnect that allows remote attackers to bypass authentication to create admin accounts is being used in the wild. Read more »

92% of companies eyeing investment in AI-powered software

In 2024, buyers are increasingly focused on cost efficiency, AI functionality, and enhanced security, according to Gartner. The report reveals that 61% of buyers are seeking upgrades for more... Read more »

TruffleHog: Open-source solution for scanning secrets

TruffleHog is an open-source scanner that identifies and addresses exposed secrets throughout your entire technology stack. “TruffleHog was originally a research tool I independently authored in 2016. When I... Read more »

LockBit Ransomware Gang’s Website Shut Down by FBI and International Law Enforcement

The enforcement action is a major blow against the ransomware-as-a-service provider, which has been connected to 2,000 victims globally. Read more »

CVE Prioritizer: Open-source tool to prioritize vulnerability patching

CVE Prioritizer is an open-source tool designed to assist in prioritizing the patching of vulnerabilities. It integrates data from CVSS, EPSS, and CISA’s KEV catalog to offer insights into... Read more »

OpenAI’s Sora Generates Photorealistic Videos

Sora is in red teamers’ and selected artists’ hands for now, as OpenAI tries to prevent AI video from being used for misinformation or offensive content. Read more »

5 free digital forensics tools to boost your investigations

Digital forensics plays a crucial role in analyzing and addressing cyberattacks, and it’s a key component of incident response. Additionally, digital forensics provides vital information for auditors, legal teams,... Read more »

Product showcase: SearchInform Risk Monitor – next-gen DLP based insider threat mitigation platform

Basically, DLP systems are aimed at prevention of data leaks, and in real-life mode they monitor and block (if required) transmitting of confidential data. However, the traditional approach to... Read more »

Integrating cybersecurity into vehicle design and manufacturing

In this Help Net Security interview, Yaron Edan, CISO at REE Automotive, discusses the cybersecurity landscape of the automotive industry, mainly focusing on electric and connected vehicles. Edan highlights... Read more »

SiCat: Open-source exploit finder

SiCat is an open-source tool for exploit research designed to source and compile information about exploits from open channels and internal databases. Its primary aim is to assist in... Read more »
Subscribe to our Newsletter