![Dell](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195327/Dell-400x200.png)
Dell SonicWALL GMS comes with hidden default account
While developing new audit modules for the company’s vulnerability scanning technology, Digital Defense researchers found six vulnerabilities in Dell’s SonicWALL …
![sap](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113936/sap-400x200.jpg)
Vulnerabilities affecting SAP HANA and SAP Trex put 10,000 customers at risk
Onapsis released new security advisories detailing vulnerabilities in SAP HANA and SAP Trex. Included in the advisories is a critical risk vulnerability that could be used to …
![servers](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113122/servers-400x200.jpg)
Cisco plugs critical flaw in data center operations management solution
Cisco has patched another critical vulnerability in its Unified Computing System Performance Manager software. Cisco UCS Performance Manager is a data center operations …
![lighter](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113536/lighter-400x200.jpg)
1 in 3 content theft websites expose visitors to malware
A Digital Citizens investigation has found that malware operators and content theft website owners are teaming up to target consumers – with an unexpected assist from …
![entrepreneur](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113159/entrepreneur-400x200.jpg)
Challenges of cybersecurity due diligence in the acquisition process
Acquirers are increasingly aware of the need for vigorous cybersecurity due diligence in M&A, yet often lack the proper personnel to conduct thorough analyses, according …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195045/lock-key-400x200.jpg)
Bart ransomware victims get free decryptor
AVG malware analyst Jakub Kroustek has devised a decryptor for Bart ransomware, and the company has made it available for download (for free). Bart ransomware This particular …
![wire](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194903/wire-400x200.jpg)
Overreliance on perimeter-based defense creates opportunities for attackers
RSA has announced the results of research that demonstrates organizations in Asia Pacific & Japan (APJ) investing in detection and response technologies are better poised …
![jigsaw](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195236/jigsaw-400x200.png)
Oracle splats 276 bugs with mammoth Critical Patch Update
In case you missed it, Oracle’s July 2016 Critical Patch Update is out, and it’s bigger than ever before. It plugs 276 security issues across hundreds of Oracle …
![Dunlop](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111421/dunlop-400x200.png)
Slew of WP-based business sites compromised to lead to ransomware
If an approach works well, there is no reason to change tack, and the masters of the SoakSoak botnet are obviously of the same belief. A year and a half after they have been …
![Biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112119/biohazard-400x200.jpg)
Ammyy Admin remote admin tool repeatedly bundled with Trojans
The website of the company that develops the popular remote administration software Ammyy Admin has been repeatedly compromised in the last year or so, and users who …
![Eduardo Cabrera, Chief Cybersecurity Officer at Trend Micro](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111427/ed_cabrera-featured4-400x200.jpg)
CISOs need teamwork and a framework, says Chief Cybersecurity Officer at Trend Micro
Eduardo Cabrera is the Chief Cybersecurity Officer at Trend Micro, responsible for analyzing emerging cyber threats to develop enterprise risk management strategies. Before …
![business](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111440/business-400x200.jpg)
Five trends to help senior executives protect against fraud threats
A new Experian report identifies five trends that businesses should assess and take action on to mitigate fraud and improve the customer experience in today’s …