Zeljka Zorz
![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105515/businessman-400x200.jpg)
Which cybersecurity failures cost companies the most and which defenses have the highest ROI?
Massachusetts Institute of Technology (MIT) scientists have created a cryptographic platform that allows companies to securely share data on cyber attacks they suffered and …
![Cisco Jabber](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/03101235/cisco-jabber-ui-400x200.jpg)
Cisco patches critical, wormable RCE flaw in Cisco Jabber
Cisco has patched four vulnerabilities in its Jabber client for Windows, the most critical of which (CVE-2020-3495) could allow attackers to achieve remote code execution by …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100127/face-400x200.jpg)
Microsoft builds deepfakes detection tool to combat election disinformation
Microsoft has developed a deepfakes detection tool to help news publishers and political campaigns, as well as technology to help content creators “mark” their …
![Tor Project](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105651/tor_project-400x200.jpg)
Tor Project launches program to secure funding for software development
The Tor Project, the research-education nonprofit organization that maintains software for the Tor anonymity network, has announced a membership program to secure funding that …
![Shlayer](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/01133602/shlayer-adware-400x200.jpg)
Apple-notarized malware foils macOS defenses
Shlayer adware creators have found a way to get their malicious payload notarized by Apple, allowing it to bypass anti-malware checks performed by macOS before installing any …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/01102838/cisco-pattern-logo-400x200.jpg)
Attackers are exploiting two zero-day flaws in Cisco enterprise-grade routers
A technical support intervention has revealed two zero-day vulnerabilities in the OS running on Cisco enterprise-grade routers that attackers are trying to actively exploit. …
![tracking](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/26160511/track-eye-400x200.jpg)
Confirmed: Browsing histories can be used to track users
Browsing histories can be used to compile unique browsing profiles, which can be used to track users, Mozilla researchers have confirmed. There are also many third parties …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102610/gdpr-3-400x200.jpg)
The state of GDPR compliance in the mobile app space
Among the rights bestowed upon EU citizens by the General Data Protection Regulation (GDPR) is the right to access their personal data stored by companies (i.e., data …
![ATM](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/21104258/atm-dollars-money-400x200.jpg)
ATM makers fix flaws allowing illegal cash withdrawals
ATM manufacturers Diebold Nixdorf and NCR have fixed a number of software vulnerabilities that allowed attackers to execute arbitrary code with or without SYSTEM privileges, …
![fileless worm](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/19134137/fileless-worm-skull-red-400x200.jpg)
Fileless worm builds cryptomining, backdoor-planting P2P botnet
A fileless worm dubbed FritzFrog has been found roping Linux-based devices – corporate servers, routers and IoT devices – with SSH servers into a P2P botnet whose …
![Kali Linux 2020.3](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/19095110/kali_linux20203-400x200.jpg)
Kali Linux 2020.3 released: A new shell and a Bluetooth Arsenal for NetHunter
Offensive Security has released Kali Linux 2020.3, the latest iteration of the popular open source penetration testing platform. You can download it or upgrade to it. Kali …
![error](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/13134949/error-x-400x200.jpg)
Updated cryptojacking worm steals AWS credentials
A malicious cryptocurrency miner and DDoS worm that has been targeting Docker systems for months now also steals Amazon Web Services (AWS) credentials. What’s more, …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?