Please turn on your JavaScript for this page to function normally.
Nate Warfield
CISOs’ role in identifying tech components and managing supply chains

In this Help Net Security interview, Nate Warfield, Director of Threat Research and Intelligence at Eclypsium, outlines the crucial tasks for CISOs in protecting supply chains …

Fly Catcher
Fly Catcher: Detect aircraft spoofing by monitoring for malicious signals

Fly Catcher is an open-source device that can detect aircraft spoofing by monitoring for malicious ADS-B signals in the 1090MHz frequency. Angelina Tsuboi, the developer of …

Citrix
Citrix Bleed: Mass exploitation in progress (CVE-2023-4966)

CVE-2023-4966, aka “Citrix Bleed”, a critical information disclosure vulnerability affecting Citrix NetScaler ADC/Gateway devices, is being massively exploited by …

IoT
Inadequate IoT protection can be a costly mistake

97% of organizations are struggling to secure their IoT and connected products to some degree, according to Keyfactor. The research survey also found that 98% of organizations …

Bruschetta-Board
Bruschetta-Board: Multi-protocol Swiss Army knife for hardware hackers

Bruschetta-Board is a device for all hardware hackers looking for a fairly-priced all-in-one debugger and programmer that supports UART, JTAG, I2C & SPI protocols and …

U.S. Cyber Trust Mark
U.S. Cyber Trust Mark labeling program raises the bar for smart devices’ cybersecurity

The Biden-Harris Administration has announced a cybersecurity certification and labeling program to help Americans more easily choose smart devices that are safer and less …

EncroChat
EncroChat dismantling lead to 6500 arrests, EUR 900 million seized

Worldwide, 6558 arrests follow the dismantling of EncroChat, a tool favored by organized crime groups (OCGs). 197 of those arrested were high-value targets. This result is …

risk
Organizations brace for cyber attacks despite improved preparedness

Cyber-risk levels have improved from “elevated” to “moderate” for the first time, but insiders represent a persistent threat for global organizations, …

power
Why juice jacking is overhyped

Travelers should avoid public USB charging stations at airports, hotels, and other venues, as they may harbor malicious software. Designed for both data and power …

router
Researchers discover sensitive corporate data on decommissioned routers

Looking at configuration data, 56% of decommissioned routers disposed of and sold on the secondary market contained sensitive corporate data, according to ESET. Of the …

tools
Security beyond software: The open source hardware security evolution

Mention IT security, and most people immediately think of software-based protections against software-based threats: ransomware, viruses, and other forms of malware. But …

QNAP
Vulnerabilities impacting multiple QNAP operating systems (CVE-2022-27597, CVE-2022-27598)

Two vulnerabilities affecting various QNAP operating systems (CVE-2022-27597 and CVE-2022-27598) have been uncovered by Sternum. These vulnerabilities enable authenticated …

Don't miss

Cybersecurity news