![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102007/cisco-400x200.jpg)
Cisco fixes critical flaws in Small Business Series Switches
Nine vulnerabilities – 4 of them critical – have been found in a variety of Cisco Small Business Series Switches. PoC exploit code is available (but not public), …
![Advantech EKI-1524-CE](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/11111939/advantech_eki-1524-ce-400x200.jpg)
Advantech’s industrial serial device servers open to attack
Three vulnerabilities in Advantech’s EKI series of serial device servers could be exploited to execute arbitrary commands on the OS level. Source: CyberDanube The …
![router](https://img.helpnetsecurity.com/wp-content/uploads/2023/03/06165642/router-1600-400x200.jpg)
Business-grade routers compromised in low-key attack campaign
An unknown threat actor has discreetly compromised business-grade DrayTek routers in Europe, Latin and North America, equipping them with a remote access trojan (dubbed …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094408/cloud2-400x200.jpg)
How a hub and spoke model can future-proof your cloud deployment
Cloud adoption among organizations has increased dramatically over the past few years, both in the range of services used and the extent to which they are employed, according …
![Access Point](https://img.helpnetsecurity.com/wp-content/uploads/2023/02/13142747/access_point_ap-400x200.jpg)
Vulnerabilities open Korenix JetWave industrial networking devices to attack
Three vulnerabilities found in a variety of Korenix JetWave industrial access points and LTE cellular gateways may allow attackers to either disrupt their operation or to use …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095922/network1-400x200.jpg)
Why the atomized network is growing, and how to protect it
Security teams struggle to defend their dispersed networks because the technologies responsible for network security are being pushed towards obsolescence by evolutionary …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093801/cloud-drive2-400x200.jpg)
How to get cloud migration right
If you want to get cloud migration right, you must deal with an inconvenient truth: Cloud or hybrid cloud environments lower the drawbridge between your data center and the …
![Anubhav Arora](https://img.helpnetsecurity.com/wp-content/uploads/2022/11/22131827/anubhav_arora-2-cradlepoint-400x200.jpg)
5G can reduce – but also create – security risk
In this interview with Help Net Security, Anubhav Arora, VP of Security Engineering at Cradlepoint, talks about the most common 5G security misconceptions, how to make sure …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095321/data-400x200.jpg)
How can CISOs catch up with the security demands of their ever-growing networks?
Vulnerability management has always been as much art as science. However, the rapid changes in both IT networks and the external threat landscape over the last decade have …
![USA](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093113/usa-flag-400x200.jpg)
Security “sampling” puts US federal agencies at risk
Titania launched an independent research report that uncovers the impact of exploitable misconfigurations on the security of networks in the US federal government. The study, …
![VPN](https://img.helpnetsecurity.com/wp-content/uploads/2022/09/27055817/vpn-1600-400x200.jpg)
65% of companies are considering adopting VPN alternatives
Despite high awareness of VPN risks, remote work forced many companies to rely more heavily on legacy access methods during the pandemic. At the same time, cybercriminals …
![glasses](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101237/glasses-400x200.jpg)
20/20 visibility is paramount to network security
Infoblox announced the results of a Forrester Consulting study, which found IT leaders around the world share a ubiquitous appetite for greater network visibility. The …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD