Mandiant
![Sunil Potti](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/14120312/sunil_potti-2-google-400x200.jpg)
Empowering Google security and networking solutions with AI
In this Help Net Security interview, Sunil Potti, GM and VP of Cloud Security at Google Cloud, talks about how new security and networking solutions powered by AI help improve …
![Progress MOVEit](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/01162951/progress-moveit-400x200.jpg)
MOVEit Transfer zero-day was exploited by Cl0p gang (CVE-2023-34362)
The zero-day vulnerability attackers have exploited to compromise vulnerable Progress Software’s MOVEit Transfer installations finally has an identification number: …
![Barracuda](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/30185818/barracuda-hands2-400x200.jpg)
Attackers hacked Barracuda ESG appliances via zero-day since October 2022
Barracuda says that the recently discovered compromise of some of it clients’ ESG appliances via a zero-day vulnerability (CVE-2023-2868) resulted in the deployment of …
![RSAC2023 pt2](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/26160826/img_6432-1200px-400x200.jpg)
Photos: RSA Conference 2023, part 2
RSA Conference 2023 is taking place at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news. Part 1 of the photos is …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/27102024/ransomware_2_26082021-400x200.jpg)
Organizations are stepping up their game against cyber threats
Global median dwell time drops to just over two weeks, reflecting the essential role partnerships and the exchange of information play in building a more resilient …
![puzzle](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093834/puzzle-400x200.jpg)
3CX breach linked to previous supply chain compromise
Pieces of the 3CX supply chain compromise puzzle are starting to fall into place, though we’re still far away from seeing the complete picture. In the meantime, we now …
![3CX](https://img.helpnetsecurity.com/wp-content/uploads/2023/03/30122613/3cx-trojanized-app-1000-400x200.jpg)
3CX compromise: More details about the breach, new PWA app released
3CX has released an interim report about Mandiant’s findings related to the compromise the company suffered last month, which resulted in a supply chain attack targeting …
![3CX](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/03150300/3cx-1600-400x200.jpg)
3CX supply chain attack: What do we know?
Five days have passed since the supply chain attack targeting 3CX customers gained wider public attention, but the software’s manufacturer is yet to confirm how the …
![Google EU](https://img.helpnetsecurity.com/wp-content/uploads/2023/01/11102437/google-eu-400x200.jpg)
These 15 European startups are set to take the cybersecurity world by storm
Google has announced the startups chosen for its Cybersecurity Startups Growth Academy. The 15 selected startups are from eight countries and were chosen from over 120 …
![resurrection](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113925/hackingteam-400x200.jpg)
2022 witnessed a drop in exploited zero-days
Malicious threat actors have actively exploited 55 zero-days in 2022 – down from 81 in 2021 – with Microsoft, Google, and Apple products being most targeted. 53 …
![bulb](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102312/bulb-400x200.jpeg)
Actionable intelligence is the key to better security outcomes
Despite the widespread belief that understanding the cyber threat actors who could be targeting their organization is important, 79% of respondents stated that their …
![Healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/17123146/healthcare-attack-heart-400x200.jpg)
North Korea targets US, South Korean hospitals with ransomware to fund further cyber operations
US and South Korean agencies have issued a joint cybersecurity advisory describing the tactics, techniques and procedures used by North Korean hackers to deploy …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD