Please turn on your JavaScript for this page to function normally.
CVSS 4.0
CVSS 4.0 released, to help assess real-time threat and impact of vulnerabilities

FIRST has unveiled the latest version of its Common Vulnerability Scoring System (CVSS 4.0). Critical in the interface between supplier and consumer, CVSS provides a way to …

large language models
Combatting data governance risks of public generative AI tools

When companies utilize public generative AI tools, the models are refined on input data provided by the company. Regarding data security, unauthorized use of sensitive data or …

NetSPI ASM
Attack Surface Management: Identify and protect the unknown

In this Help Net Security video, Brianna McGovern, Product Manager, Attack Surface Management, NetSPI, discusses Attack Surface Management (ASM). Attack Surface Management …

malware
20% of malware attacks bypass antivirus protection

Security leaders are concerned about attacks that leverage malware-exfiltrated authentication data, with 53% expressing extreme concern and less than 1% admitting they weren’t …

lock
Infrastructure upgrades alone won’t guarantee strong security

While 75% of organizations have made significant strides to upgrade their infrastructure in the past year, including the adoption of public cloud hosting and containerization, …

servers
Only 45% of cloud data is currently encrypted

39% of businesses have experienced a data breach in their cloud environment last year, an increase on the 35% reported in 2022, according to Thales. In addition, human error …

laptop
Same code, different ransomware? Leaks kick-start myriad of new variants

Threat landscape trends demonstrate the impressive flexibility of cybercriminals as they continually seek out fresh methods of attack, including exploiting vulnerabilities, …

ransomware
Staying ahead of the “professionals”: The service-oriented ransomware crime industry

Ransomware has been a hugely profitable industry for criminal gangs for the last few years. The total amount of ransom paid since 2020 is estimated to be at least $2 billion, …

executive
CIOs prioritize innovation over tech stack optimization

Despite economic obstacles and constraints on IT budgets, global CIOs maintain a positive outlook on the potential of technology to provide significant benefits for their …

Certified in Cybersecurity
Free entry-level cybersecurity training and certification exam

The Ultimate Guide to Certified in Cybersecurity (CC) covers everything you need to know about the entry-level credential recognized by organizations worldwide. Inside, learn …

EU-U.S. Data Privacy Framework
European Commission adopts adequacy decision for safe EU-U.S. data flows

Today, the European Commission adopted its adequacy decision for the EU-U.S. Data Privacy Framework. The decision concludes that the United States ensures an adequate level of …

vulnerabilities
Owncast, EaseProbe security vulnerabilities revealed

Oxeye has uncovered two critical security vulnerabilities and recommends immediate action to mitigate risk. The vulnerabilities were discovered in Owncast (CVE-2023-3188) and …

Don't miss

Cybersecurity news