New zero-click threat targets iPhones and iPads

A recent report from Kaspersky revealed a zero-click attack method that requires no action from victims to infect iOS devices. The post New zero-click threat targets iPhones and iPads... Read more »

WWDC 2023: Apple launches Vision Pro and raft of products powered by new chipsets

At its Worldwide Developers conference, Apple unveiled supercomputation power on mobile and desktop devices, but the Vision Pro AR headset took center stage. The post WWDC 2023: Apple launches... Read more »

iOS 17 cheat sheet: Release date, supported devices and more

iOS 17 has been announced, and it’s Appleā€™s best version of iOS. Learn everything you need to know about iOS 17’s features, release date and how to get it.... Read more »

Zero-day MOVEit Transfer vulnerability exploited in the wild, heavily targeting North America

Read the technical details about this zero-day MoveIT vulnerability, find out who is at risk, and learn how to detect and protect against this SQL injection attack. The post... Read more »

Improve your app security on Azure

Application instance lock, Azure Virtual Network Manager and Network Watcher troubleshooting: tools for making the applications you run on Azure more secure. The post Improve your app security on... Read more »

How to determine exactly what personal information Microsoft Edge knows about you

Users should be aware of what personal data is being collected and stored by Microsoft Edge and be prepared to perform periodic maintenance on that data to keep it... Read more »

Windows 11: Enforcing password resets for local group users

Admins can force users to reset their respective passwords during their next Windows 11 login by making a few simple changes on a difficult-to-find configuration screen. The post Windows... Read more »

Penetration tester develops AWS-based automated cracking rig

Building a custom cracking rig for research can be expensive, so penetration tester Max Ahartz built one on AWS. In this Help Net Security interview, he takes us through... Read more »

CISO-approved strategies for software supply chain security

Integrating proprietary and open-source code, APIs, user interfaces, application behavior, and deployment workflows creates an intricate composition in modern applications. Any vulnerabilities within this software supply chain can jeopardize... Read more »

GitLab announces AI-DevSecOps platform GitLab 16

GitLab 16 includes more than 55 improvements and new features. Learn about the most notable new technologies in this GitLab platform. The post GitLab announces AI-DevSecOps platform GitLab 16... Read more »
Subscribe to our Newsletter