![NetComm NF20MESH](https://img.helpnetsecurity.com/wp-content/uploads/2023/01/18145018/netcomm-nf20mesh-400x200.jpg)
Vulnerable NetComm routers and a public PoC exploit (CVE-2022-4873, CVE-2022-4874)
Two vulnerabilities (CVE-2022-4873, CVE-2022-4874) found in three NetComm router models could be exploited to achieve remote code execution on vulnerable devices, and …
![fast](https://img.helpnetsecurity.com/wp-content/uploads/2018/12/09095617/fast-400x200.jpg)
Global instability increases cyber risk, says World Economic Forum
Geopolitical instability is exacerbating the risk of catastrophic cyberattacks, according to the Global Cybersecurity Outlook 2023 report from the World Economic Forum. The …
![Google ads](https://img.helpnetsecurity.com/wp-content/uploads/2023/01/18131424/google_ads-18012023-02-400x200.jpg)
Google ads increasingly pointing to malware
The FBI has recently warned the public about search engine ads pushing malware diguised as legitimate software – an old tactic that has lately resulted in too many …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/13131647/lock-data-400x200.jpg)
How data protection is evolving in a digital world
Companies are challenged with more complex hybrid IT environments. They are raising budgets to fend off cyberattacks and keep up as production environments continue to …
![ManageEngine](https://img.helpnetsecurity.com/wp-content/uploads/2023/01/17133814/manageengine-door-400x200.jpg)
PoC for critical ManageEngine bug to be released, so get patching! (CVE-2022-47966)
If your enterprise is running ManageEngine products that were affected by CVE-2022-47966, check now whether they’ve been updated to a non-vulnerable version because …
![hybrid work](https://img.helpnetsecurity.com/wp-content/uploads/2021/11/26090703/hybrid_3_hns-400x200.jpg)
Training, endpoint management reduce remote working cybersecurity risks
33% of companies are not providing any cybersecurity awareness training to users who work remotely, according to Hornetsecurity. The study also revealed that nearly 74% of …
![CircleCI](https://img.helpnetsecurity.com/wp-content/uploads/2023/01/16144633/circleci-logo-1280-400x200.jpg)
CircleCI breach post-mortem: Attackers got in by stealing engineer’s session cookie
The attackers who pulled off the recent breach of continuous integration and continuous delivery (CI/CD) platform maker CircleCI got in by compromising an engineer’s …
![Cacti](https://img.helpnetsecurity.com/wp-content/uploads/2023/01/16122033/cacti-glass-400x200.jpg)
Cacti servers under attack by attackers exploiting CVE-2022-46169
If you’re running the Cacti network monitoring solution and you haven’t updated it since early December, now is the time to do it to foil attackers exploiting a …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102952/computer-lock-400x200.jpg)
10 data security enhancements to consider as your employees return to the office
77% of IT decision makers across the United States and Canada believe their companies are likely to face a data breach within the next three years according to survey results …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/23122821/ai-brain-bkg-400x200.jpg)
Post-quantum cybersecurity threats loom large
A new Zapata Computing report reveals a deepening commitment from enterprises that points to a maturing industry with widespread, global interest and increased urgency …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/16094609/week_in_review3-400x200.jpg)
Week in review: ChatGPT as an infosec assistant, Google offers help to EU cybersecurity startups
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Google is calling EU cybersecurity founders Google announced that the Google …
![fuzzing](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104433/twitter-iot1-400x200.jpg)
Vulnerabilities in cryptographic libraries found through modern fuzzing
Recently patched vulnerabilities in MatrixSSL and wolfSSL, two open-source TLS/SSL implementations / libraries for embedded environments, have emphasized the great potential …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality