![person](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094316/person-1-400x200.jpg)
Surge in identity crime victims reporting suicidal thoughts
Identity theft can have great financial impact on the victims, but the experienced emotional, physical and psychological impact can be even more devastating, according to the …
![Mac malware](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095315/mac-malware-400x200.jpg)
Bogus OfficeNote app delivers XLoader macOS malware
A new macOS-specific variant of the well known XLoader malware is being delivered disguised as the “OfficeNote” app. “Multiple submissions of this sample …
![Security Onion](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/23114647/security_onion-400x200.jpg)
Security Onion 2.4: Free, open platform for defenders gets huge update
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It has been downloaded over 2 million times and is being …
![fish phishing](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114006/fish-400x200.jpg)
Open redirect flaws increasingly exploited by phishers
Phishing attacks using open redirect flaws are on the rise again, according to Kroll’s Cyber Threat Intelligence (CTI) team, which means organizations should consider …
![Roland Atoui](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/16131101/roland_atoui-2-red_alert_labs-400x200.jpg)
Anticipating the next wave of IoT cybersecurity challenges
In this Help Net Security interview, Roland Atoui, Managing Director at Red Alert Labs, discusses the intricacies of transitioning from isolated IoT setups to interconnected …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/19153210/email-400x200.jpg)
Cybercriminals turn to AI to bypass modern email security measures
Cybercriminals employ artificial intelligence (AI) to create complex email threats like phishing and business email compromise (BEC) attacks, while modern email security …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094342/danger-400x200.jpg)
Large-scale breaches overshadow decline in number of healthcare data incidents
While H1 2023 saw an encouraging decrease in the overall number of data breaches impacting healthcare organizations, it was overshadowed by large-scale breaches resulting in a …
![Ivanti](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/31150732/ivanti1-400x200.jpg)
Ivanti Sentry zero-day vulnerability exploited, patch ASAP! (CVE-2023-38035)
Ivanti is urging administrators of Ivanti Sentry (formerly MobileIron Sentry) gateways to patch a newly discovered vulnerability (CVE-2023-38035) that could be exploited to …
![](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/22104306/seiko-400x200.jpg)
Seiko joins growing list of ALPHV/BlackCat ransomware victims
Japanese watchmaker Seiko has been added to ALPHV (BlackCat) ransomware group’s victim list, following a data breach occurring in early August. The Seiko data breach The …
![Juniper Networks SRX Firewalls](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/21151908/juniper-networks-srx-firewalls-1400-400x200.jpg)
Juniper Networks fixes flaws leading to RCE in firewalls and switches
Juniper Networks has fixed four vulnerabilities (CVE-2023-36844, CVE-2023-36845, CVE-2023-36846, CVE-2023-36847) in Junos OS that, if chained together, could allow attackers …
![Kennedy Torkura](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/16131056/kennedy_torkura-2-mitigant-400x200.jpg)
Maintaining consistent security in diverse cloud infrastructures
As cloud infrastructures become increasingly API-driven and dynamically spread across expansive attack surfaces, achieving clarity proves difficult. Compounding this challenge …
![open-source OSINT tools](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/21114803/open-source_osint_tools-1400-400x200.jpg)
8 open-source OSINT tools you should try
Open-Source Intelligence (OSINT) refers to gathering, assessing, and interpreting public information to address specific intelligence queries. All the tools listed here are …
Featured news
Sponsored
Don't miss
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)
- Fighting AI-powered synthetic ID fraud with AI
- Laying the groundwork for zero trust in the military
- Grype: Open-source vulnerability scanner for container images, filesystems
- Signatures should become cloud security history