Zeljka Zorz
![Slack](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094448/slack2-400x200.jpg)
Slack warns investors it might be targeted by organized crime, nation-state hackers
Slack Technologies, the company whose cloud-based collaboration tools and services are used by companies worldwide, has warned potential investors that the company faces …
![Oracle](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104527/oracle-400x200.jpg)
Researchers flag new Oracle WebLogic zero-day RCE flaw
Attackers looking to compromise Oracle WebLogic servers for their own needs have a new zero-day RCE flaw at their disposal. “Oracle WebLogic wls9_async and wls-wsat …
![Skull](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103817/skull-ascii-400x200.jpg)
Another European manufacturer crippled by ransomware
Aebi Schmidt, a Switzerland-based manufacturer and provider of municipal and agriculture machinery, has apparently been hit by ransomware. What happened? “Due to an IT …
![Qualcomm](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094501/qualcomm-400x200.jpg)
Qualcomm chips leak crypto data from secure execution environment
A vulnerability in Qualcomm chips could be exploited by attackers to retrieve encryption keys and sensitive information from the chipsets’ secure execution environment, …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100228/ddos-400x200.jpg)
The latest DDoS attacks are mostly multi-vector and morph over time
DDoS attacks continue to be an effective means to distract and confuse security teams while inflicting serious damage to brands, according to Neustar. Also, when comparing Q1 …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094518/email-400x200.jpg)
Which employees receive the most highly targeted email-borne threats?
Workers in R&D/Engineering are the most heavily targeted group of employees within organizations, a new Proofpoint report says, and lower-level employees are at a higher …
![BEC scams](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094520/bec-400x200.jpg)
Latest numbers show why BEC/EAC scams are here to stay
Extortion has become the second most often reported type of cybercrime, but BEC/EAC scams still reign supreme when it comes to monetary loss (or criminals’ earnings), …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195208/password-400x200.jpg)
Are your passwords among the 100,000 most breached ones?
Year after year, the list of most often used passwords changes but a little: the latest one, compiled by infosec researcher Troy Hunt and published by the UK National Cyber …
![DevSecOps](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094558/devsecops1-400x200.jpg)
DevSecOps: Fast development without sacrificing safety
DevOps has been a boon to companies looking to shorten the systems development cycle, pushing software developers and IT operations to work together and help their enterprises …
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094554/android-400x200.jpg)
Google will check apps by new developers more thoroughly
In an attempt to thwart Android developers who are set to distribute malicious apps through Google Play, Google will be taking more time when reviewing apps by developers with …
![Outlook](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094623/outlook-400x200.jpg)
Hackers used credentials of a Microsoft Support worker to access users’ webmail
On Friday, an unknown number of customers of Microsoft’s webmail services (Outlook.com, Hotmail, MSN Mail) received a notice from the company telling them that attackers …
![G Suite](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102108/gsuite-400x200.jpg)
Google introduces many G Suite security enhancements
Last week, the big news from Google Cloud Next 2019 was that phones running Android 7.0 or higher can be turned into a security key for G Suite account 2-step verification. …
Featured news
Sponsored
Don't miss
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)
- Fighting AI-powered synthetic ID fraud with AI
- Laying the groundwork for zero trust in the military
- Grype: Open-source vulnerability scanner for container images, filesystems
- Signatures should become cloud security history