Zeljka Zorz
![hole](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112510/hole-400x200.jpg)
Cisco Talos discloses serious vulnerabilities in Foxit PDF Reader
Cisco Talos researcher Aleksandar Nikolic has unearthed one of the critical vulnerabilities fixed in the latest Adobe Acrobat and Reader security updates. He is also the one …
![Adobe Reader](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105355/adobe_reader-400x200.jpg)
Adobe fixes 47 critical flaws in Acrobat and Reader
Adobe has released security updates for Adobe Acrobat and Reader, and they fix a prodigious amount of critical (47) and important (39) vulnerabilities affecting both software …
![Google Chrome](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102900/google_chrome_window-400x200.jpg)
Google to make Chrome extensions safer and privacy-preserving
Google has announced a number of security changes in the Chrome extensions system: a more thorough extensions review process, better user controls, and a new manifest that …
![Android explode](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103322/android-explode-400x200.jpg)
Vulnerable Android password managers make phishing attacks easier
Android password managers can be tricked into entering valid login credentials into phishing apps, a group of researchers has discovered. They have also found that Instant …
![sharing](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101707/sharing-400x200.jpg)
WWW inventor announces Solid, a push to create a decentralized web users can trust
Tim Berners-Lee, the inventor of the World Wide Web, has not been hiding his disappointment with the direction in which his invention was taken. “The web has evolved …
![Python](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100057/python-400x200.jpg)
Python-based attack tools are the most common vector for launching exploit attempts
Hackers have an obvious predilection for Python-based attack tools, says Imperva. “When examining the use of Python in attacks against sites we protect, the result was …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105608/danger-400x200.jpg)
Phorpiex bots target remote access servers to deliver ransomware
Threat actors are brute-forcing their way into enterprise endpoints running server-side remote access applications and attempting to spread the GandCrab ransomware onto other …
![Car](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112931/car-hacking-400x200.jpg)
Connected car security is improving, researchers say
The automotive industry has apparently stepped up their game when it comes to improving connected car security. According to the latest IOActive report, which was compiled …
![VirusTotal Enterprise Graph](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100118/VirusTotal-Enterprise-Graph-400x200.jpg)
Chronicle announces VirusTotal Enterprise with greater search and analysis capabilities
Chronicle, the cybersecurity subsidiary of Google’s parent company Alphabet, has announced VirusTotal Enterprise, which is aimed at helping enterprises protect their own …
![Apple](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100115/apple-business-400x200.jpg)
Apple DEP vulnerability lets attackers access orgs’ resources, info
An authentication weakness in Apple’s Device Enrollment Program (DEP) may allow attackers to enroll any device into an organization’s Mobile Device Management …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100140/network-400x200.jpeg)
The state of network security in organizations with 1000+ employees
Security team size at the largest organizations does not scale with the number of overall employees, but they are more likely to include staff with specialized roles, say the …
![Firefox Monitor](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100120/firefox-monitor-400x200.png)
Firefox Monitor tells you whether your email was compromised in a data breach
After a few months of user testing, Mozilla has launched Firefox Monitor, a free online service that allows users to check whether their email address was involved in a …
Featured news
Sponsored
Don't miss
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality
- FIN7 sells improved EDR killer tool
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)
- Fighting AI-powered synthetic ID fraud with AI