![email](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/25130053/email-2-1500-400x200.webp)
Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
The maintainers of the Exim mail transfer agent (MTA) have fixed a critical vulnerability (CVE-2024-39929) that currently affects around 1.5 million public-facing servers and …
![privacy](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28143248/privacy1-400x200.jpg)
Risk related to non-human identities: Believe the hype, reject the FUD
The hype surrounding unmanaged and exposed non-human identities (NHIs), or machine-to-machine credentials – such as service accounts, system accounts, certificates and …
![Realm](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/06152013/realm-1500-400x200.webp)
Realm: Open-source adversary emulation framework
Realm is an open-source adversary emulation framework emphasizing scalability, reliability, and automation. It’s designed to handle engagements of any size. “Realm …
![Pranava Adduri](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/21131715/pranava_adduri-2-bedrock_security-400x200.webp)
Discover the growing threats to data security
In this Help Net Security interview, Pranava Adduri, CEO at Bedrock Security, discusses how businesses can identify and prioritize their data security risks. Adduri emphasizes …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/25125028/ai-genai-2-1500-400x200.webp)
Pressure mounts for C-Suite executives to implement GenAI solutions
87% of C-Suite executives feel under pressure to implement GenAI solutions at speed and scale, according to RWS. Despite these pressures, 76% expressed an overwhelming …
![cybersecurity week in review](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/25124830/cybersecurity-week-review-1-1500-400x200.webp)
Week in review: RADIUS protocol critical vuln, Microsoft 0-day exploited for a year, AT&T breach
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Hackers stole call, text records of “nearly all” of AT&T’s cellular …
![AT&T](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/31150800/att-1500-400x200.webp)
Hackers stole call, text records of “nearly all” of AT&T’s cellular customers
Hackers leveraging stolen Snowflake account credentials have stolen records of calls and texts made by “nearly all” of AT&T’s cellular customers from May to …
![Snowflake](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/01214043/snowflake-4-1500-400x200.webp)
Info of 2,3+ million individuals stolen in Advance Auto Parts data breach
Personal information of over 2,3 million individuals has been stolen by attackers as part of the massive data grab via compromised Snowflake accounts without MFA protection, …
![third party](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/31195646/third-party2-400x200.webp)
How to design a third-party risk management framework
Most organizations focus on securing routers, servers, firewalls, and other endpoints, but threats can also arise from unfamiliar sources such as third-party networks, which …
![Ashley Harrington](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/08122612/ashley-harrington-2-aspida-400x200.webp)
Managing cyberattack fallout: Financial and operational damage
In this Help Net Security, Ashley Harrington, Director of Cybersecurity at Aspida, discusses the impact of cyberattack on business operations and financial health. Beyond …
![compliance](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/26142115/compliance-400x200.jpg)
Top priorities for compliance leaders this year
Legal, compliance and privacy leaders list strengthening their personal impact on company strategy as their top priority for 2024, according to Gartner. Improving third party …
![Infosec products of the week](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/28091843/infosec-week-1200-400x200.webp)
New infosec products of the week: July 12, 2024
Here’s a look at the most interesting products from the past week, featuring releases from AttackIQ, IT-Harvest, Pentera, Prompt Security, and Quantum Xchange. AttackIQ …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders