![red](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101022/red-400x200.jpg)
VPNFilter malware targets new devices, can deliver exploits to endpoints
Cisco Talos researchers have news about the VPNFilter malware, and it doesn’t look good: It is capable of compromising a much wider array of routers than previously …
![train](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101113/train-400x200.jpg)
Hackers can jump from passenger Wi-Fi to train control networks
Setting up a Wi-Fi network for passengers to use is practically a must for railway companies these days. Unfortunately, that welcome add-on for travelers can become a means …
![storm](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104322/storm-400x200.jpeg)
US, UK warn Russians hackers are compromising networking devices worldwide
Russian state-sponsored hackers are targeting network infrastructure devices worldwide, the US Department of Homeland Security (DHS), Federal Bureau of Investigation (FBI), …
![Cisco switch](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104427/Cisco-switches-400x200.jpg)
Critical vulnerability opens Cisco switches to remote attack
A critical vulnerability affecting many of Cisco’s networking devices could be exploited by unauthenticated, remote attackers to take over vulnerable devices or trigger …
![Wi-Fi](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102230/wifi-400x200.jpg)
WPA3 to feature much needed security enhancements
The Wi-Fi Alliance, a non-profit organization that tests and slaps the “Wi-Fi Certified” logo on products that meet certain standards of interoperability, has …
![tunnel light](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111058/tunnel-light-400x200.jpg)
PacketTotal: Free online tool for analyzing packet captures
PacketTotal is a free tool for analyzing packet captures that has recently been offered to the infosec community. Available online, the tool is powered by a Python-based …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105152/cisco-400x200.jpg)
Cisco Prime Home flaw allows hackers to reach into people’s homes
Cisco has patched a critical authentication bypass vulnerability that could allow attackers to completely take over Cisco Prime Home installations, and through them mess with …
![magnify](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105905/magnify-400x200.jpg)
SAMRi10: Windows 10 hardening tool for thwarting network recon
Microsoft researchers Itai Grady and Tal Be’ery have released another tool to help admins harden their environment against reconnaissance attacks: SAMRi10 (pronounced …
![lights](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110827/lights-400x200.jpg)
Key causes of network outages and vulnerabilities
A new global study, conducted by Dimensional Research, surveyed 315 network professionals about their experiences with network outages, vulnerabilities and compliance. How …
![NetSess](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110212/NetSess-400x200.jpg)
Net Cease: Microsoft researchers unveil anti-reconnaissance tool
Microsoft researchers Itai Grady and Tal Be’ery have released Net Cease, a PowerShell script that prevents attackers who have already compromised an endpoint from …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195446/cisco-400x200.jpg)
BENIGNCERTAIN-like flaw affects various Cisco networking devices
The leaking of BENIGNCERTAIN, an NSA exploit targeting a vulnerability in legacy Cisco PIX firewalls that allows attackers to eavesdrop on VPN traffic, has spurred Cisco to …
![cables](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112246/cables-400x200.jpg)
End-to-end network segmentation essential for security, yet few deploy
As point-of-sale breaches, ransomware attacks and various other customer data breaches continue to make local and national headlines, IT professionals agree that network …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD