![VPN](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/02120400/vpn-tunnel-400x200.jpg)
Almost all VPNs are vulnerable to traffic-leaking TunnelCrack attacks
Several vulnerabilities that affect most VPN products out there can be exploited by attackers to read user traffic, steal user information, or even attack user devices, …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093354/mac-laptop-400x200.jpg)
Macs are getting compromised to act as proxy exit nodes
AdLoad, well-known malware that has been targeting systems running macOS for over half a decade, has been observed delivering a new payload that – unbeknown to the …
![server room](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/13093457/server-room-400x200.jpg)
Major vulnerabilities discovered in data center solutions
Researchers have discovered serious security vulnerabilities in two widely used data center solutions: CyberPower’s PowerPanel Enterprise Data Center Infrastructure …
![Xavier Bellekens](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/08120311/xavier_bellekens-2-lupovis-400x200.jpg)
Deception technology and breach anticipation strategies
Cybersecurity is undergoing a paradigm shift. Previously, defenses were built on the assumption of keeping adversaries out; now, strategies are formed with the idea that they …
![ImmuniWeb Email Security Test](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/08122656/immuniweb_email_security_test-1400-400x200.jpg)
Product showcase: Free email security test by ImmuniWeb Community Edition
According to an FBI report, in 2022, global losses from business email compromise (BEC) and email account compromise (EAC) attacks attained $43 billion, hitting a historic …
![artificial intelligence](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/22145259/laptop-ai-400x200.png)
Navigating generative AI risks and regulatory challenges
The mass availability of generative AI, such as OpenAI’s ChatGPT and Google Bard, became a top concern for enterprise risk executives in the second quarter of 2023, according …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/16184227/week-in-review-400x200.jpg)
Week in review: 8 free cybersecurity docus, vulnerable Intel Core processors, Black Hat USA 2023
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Zoom CISO Michael Adams discusses cybersecurity threats, solutions, and the …
![New infosec products of the week](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/13115321/infosec-week-1200-400x200.jpg)
New infosec products of the week: August 11, 2023
Here’s a look at the most interesting products from the past week, featuring releases from Adaptive Shield, LastPass, NetSPI, Solvo, ThreatConnect, and Vicarius. NetSPI …
![Black Hat](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/10152858/blackhat-usa-2023-entrance-400x200.jpg)
Photos: Black Hat USA 2023
Black Hat USA 2023 returned to the Mandalay Bay Convention Center in Las Vegas and Help Net Security was on-site. The conference featured over 100 selected Briefings, …
![Rusty Cumpston](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/07114541/rusty_cumpston-2-rkvst-400x200.jpg)
How digital content security stays resilient amid evolving threats
With threats evolving and multiplying, it’s essential to understand how technological advancements can serve as both a challenge and an opportunity to safeguard digital …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27171231/malware-400x200.jpg)
Threat intelligence’s key role in mitigating malware threats
Malware, being one of the most prevalent and pervasive initial threat vectors, continues to adapt and become more sophisticated, according to OPSWAT. Crucial role of threat …
![smartphone](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/03125417/smartphone-bokeh2-400x200.png)
How executives’ personal devices threaten business security
Today, individual people – not businesses or government entities as a whole – are the primary targets, or entry points, for all major cyberattacks, according to …
Featured news
Sponsored
Don't miss
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)
- Fighting AI-powered synthetic ID fraud with AI
- Laying the groundwork for zero trust in the military
- Grype: Open-source vulnerability scanner for container images, filesystems
- Signatures should become cloud security history