![KeePass](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/17150945/keepass-hands-400x200.jpg)
KeePass flaw allows retrieval of master password, PoC is public (CVE-2023-32784)
A vulnerability (CVE-2023-32784) in the open-source password manager KeePass can be exploited to retrieve the master password from the software’s memory, says the …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/17143649/biohazard-hardware-400x200.jpg)
TP-Link routers implanted with malicious firmware in state-sponsored attacks
A Chinese state-sponsored APT group implanted malicious firmware into TP-Link routers as part of attack campaigns aimed at European foreign affairs entities, say Check Point …
![ChatGPT](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/04125544/chatgpt-danger4-400x200.jpg)
Scammers exploit AI trend with fake ChatGPT apps on Google Play, Apple App Store
Sophos researchers uncovered multiple apps masquerading as legitimate, ChatGPT-based chatbots to overcharge users. These apps have popped up in the Google Play and Apple App …
![Google account](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/17105826/google-account-400x200.jpg)
Inactive Google accounts will be deleted
A week after Twitter announced it will be removing idle accounts after 30 days of inaction, Google has updated its account inactivity policy. Updates to the Google account …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2021/12/01155324/malware_6_01122021-400x200.jpg)
Infamous cybercrime marketplace offers pre-order service for stolen credentials
Infostealer malware, which consist of code that infects devices without the user’s knowledge and steals data, remains widely available to buy through underground forums and …
![CIS video](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/27182054/cis-shield-400x200.jpg)
The CIS Benchmarks Community consensus process
The Center for Internet Security (CIS) recently celebrated 20 years of bringing confidence to the connected world with consensus-based security guidance. The first CIS …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/31160247/email-smoke-red-400x200.jpg)
Fraudsters send fake invoice, follow up with fake exec confirmation
Fraudsters are trying out a new approach to convince companies to pay bogus invoices: instead of hijacking existing email threads, they are creating convincing ones …
![API](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/15113755/api-code-400x200.jpg)
Attack automation becomes a prevalent threat against APIs
The second half of 2022 marked a significant turning point in the security landscape. In several high-profile incidents, application programming interfaces (APIs) emerged as a …
![electronics](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/16114009/electronics-featured-400x200.jpeg)
Lacroix manufacturing facilities shut down following cyberattack
French electronics manufacturer Lacroix closed three factories as a result of a cyberattack they “intercepted” over the weekend, the company has announced on …
![WhatsApp](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/16103838/whatsapp-2023-400x200.jpg)
WhatsApp allows users to lock sensitive chats
Meta has unveiled Chat Lock within WhatsApp, a feature that allows users to keep sensitive and intimate conversations safe from prying eyes. WhatsApp Chat Lock (Source: …
![Phil Venables](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/16101632/phil_venables-2-google-400x200.jpg)
Google Cloud CISO on why the Google Cybersecurity Certificate matters
As part of Google’s commitment to building a strong cybersecurity workforce, the Google Cybersecurity Certificate offers an affordable and accessible pathway to a career …
![Advantech EKI-1524-CE](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/11111939/advantech_eki-1524-ce-400x200.jpg)
Advantech’s industrial serial device servers open to attack
Three vulnerabilities in Advantech’s EKI series of serial device servers could be exploited to execute arbitrary commands on the OS level. Source: CyberDanube The …