Zeljka Zorz
![mobile work](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095708/mobile_work-400x200.jpg)
Orgs that sacrifice mobile security are twice as likely to suffer a compromise
The percentage of companies admitting to suffering a mobile-related compromise has grown (39%, when compared to last years’ 33%) despite a higher percentage of …
![Kali Linux](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/01140506/kali_linux-x-400x200.jpg)
Kali Linux evolution: What’s next for the open source pentesting Linux distro?
When the popular security-focused BackTrack Linux distribution was redesigned from the ground up and given the name Kali Linux nearly seven years ago, I remember thinking that …
![](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/27122245/hardware3-400x200.jpg)
CWE list now includes hardware security weaknesses
The Mitre Corporation has released version 4.0 of the Common Weakness Enumeration (CWE) list, which has been expanded to include hardware security weaknesses. About CWE The …
![Microsoft Exchange](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094348/ms_exchange-400x200.jpg)
Attackers probing for vulnerable Microsoft Exchange Servers, is yours one of them?
CVE-2020-0688, a remote code execution bug in Microsoft Exchange Server that has been squashed by Microsoft in early February, is ripe for exploitation and could become a …
![Chrome](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110806/chrome-400x200.jpg)
Google fixes another Chrome zero-day exploited in the wild
For the third time in a year, Google has fixed a Chrome zero-day (CVE-2020-6418) that is being actively exploited by attackers in the wild. About CVE-2020-6418 No details have …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100112/healthcare-400x200.jpg)
Healthcare industry at greatest risk of data breach
The healthcare industry has significantly more exposed attack surfaces than any other industry surveyed, according to Censys’s research findings of cloud risks and cloud …
![tunnel](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100728/tunnel-400x200.jpg)
A new RCE in OpenSMTPD’s default install, patch available
Less than a month after the patching of a critical RCE flaw in OpenSMTPD, OpenBSD’s mail server, comes another call to upgrade to the latest version, as two additional …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09093009/cisco-400x200.jpg)
Cisco drops security fixes for Smart Software Manager, security appliances
Cisco has released a new batch of security fixes for a number of its products, including its Smart Software Manager On-Prem solution and its Email Security and Content …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102423/network-400x200.jpg)
What is flowing through your enterprise network?
Since Edward Snowden’s revelations of sweeping internet surveillance by the NSA, the push to encrypt the web has been unrelenting. Bolstered by Google’s various initiatives …
![WordPress](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104602/wordpress-biohazard-400x200.jpg)
Free trojanized WordPress themes lead to widespread compromise of web servers
Over 20,000 web servers (and who knows how many websites) have been compromised via trojanized WordPress themes to deliver malware through malicious ads, Prevailion …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104249/industry-400x200.jpeg)
US gas pipeline shut down due to ransomware
An unnamed US gas pipeline operator has falled victim to ransomware, which managed to encrypt data both on its IT (information technology) and operational technology (OT) …
![BEC scams](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094520/bec-400x200.jpg)
Half of cybercrime losses in 2019 were the result of BEC scams
Business email compromise (BEC) and email account compromise (EAC) scams are still the most lucrative schemes for cybercriminals: the FBI’s Internet Crime Complaint Center …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?