vulnerability
![Libgcrypt](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/29110103/libgcrypt-blue-400x200.jpg)
“Serious” vulnerability found in Libgcrypt, GnuPG’s cryptographic library
Libgcrypt 1.9.0, the newest version of a cryptographic library integrated in the GNU Privacy Guard (GnuPG) free encryption software, has a “severe” security …
![](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101933/ios-400x200.jpg)
Apple fixes three actively exploited iOS zero-days
Apple has release a new batch of security updates and has fixed three iOS zero-days that “may have been actively exploited” by attackers. The three zero-days Two …
![sudo](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/27093613/sudo-command-400x200.jpg)
Sudo vulnerability allows attackers to gain root privileges on Linux systems (CVE-2021-3156)
A vulnerability (CVE-2021-3156) in sudo, a powerful and near-ubiquitous open-source utility used on major Linux and Unix-like operating systems, could allow any unprivileged …
![cybersecurity investments](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/21142945/cybersec_investments-400x200.jpg)
Cybersecurity investments will increase up to 10% in 2021
A Canalys forecast predicts cybersecurity investments will increase 10% worldwide in the best-case scenario in 2021. Information security will remain a high priority this …
![vault](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/18191201/vault-bkg-400x200.jpg)
How secure configurations meet consensus
Have you ever wondered how technology hardening guidelines are developed? Some are determined by a particular vendor or driven by a bottom-line perspective. But that’s not the …
![SonicWall](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/16124508/sonicwall-logo-fire-400x200.jpg)
SonicWall hit by attackers leveraging zero-day vulnerabilities in its own products?
On Friday evening, SonicWall announced that it “identified a coordinated attack on its internal systems by highly sophisticated threat actors exploiting probable …
![eavesdropping](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/21122549/eavesdrop-mobile-400x200.jpg)
Bugs in Signal, other video chat apps allowed attackers to listen in on users
Bugs in several messaging/video chat mobile apps allowed attackers to spy on targeted users’s surroundings. The vulnerabilities – in Signal, Google Duo, Facebook …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/22135014/user-3d-400x200.jpg)
Most CISOs believe that human error is the biggest risk for their organization
53% of CISOs and CSOs in the UK&I reported that their organization suffered at least one significant cyberattack in 2020, with 14% experiencing multiple attacks, a …
![cloud complexity](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09102001/cloud-complexity-400x200.jpg)
Does your cloud stack move faster than your cloud security solutions?
According to Gartner, worldwide end-user spending on public cloud services is forecasted to grow by 18.4% in 2021 to a total of $304.9 billion, up from $257.5 billion in 2020. …
![dnsmasq](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/19132035/dnsmasq-400x200.jpg)
Dnsmasq vulnerabilities open networking devices, Linux distros to DNS cache poisoning
Seven vulnerabilities affecting Dnsmasq, a caching DNS and DHCP server used in a variety of networking devices and Linux distributions, could be leveraged to mount DNS cache …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111248/danger-2-400x200.jpg)
Malware incidents on remote devices increase
52% of organizations experienced a malware incident on remote devices in 2020, up from 37% in 2019, a Wandera report reveals. Of devices compromised by malware in 2020, 37% …
![bot](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102336/bot-400x200.jpg)
What analytics can unveil about bot mitigation tactics
25% of internet traffic on any given day is made up of bots, the Kasada Research Team has found. In fact, there is a synthetic counterpart for almost every human interaction …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?