![Authy](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/11143217/twilio-authy-1500-400x200.webp)
Using Authy? Beware of impending phishing attempts
Do you use Authy for your multi-factor authentication needs? If you do, you should keep an eye out for phishing attempts, as well as implement defenses against SIM swapping …
![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/27142024/genai-3-1500-400x200.webp)
How AI helps decode cybercriminal strategies
With terms like “AI washing” making their way into mainstream business consciousness, the hype surrounding AI is making it harder to differentiate between the true …
![Chaim Mazal](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/24120927/chaim_mazal-2-gigamon-400x200.webp)
Strengthening cybersecurity preparedness with defense in depth
In this Help Net Security interview, Chaim Mazal, Chief Security Officer at Gigamon, discusses cybersecurity preparedness measures for businesses, the impact of international …
![travel scams](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/07135238/travel_scams-400x200.webp)
Travel scams exposed: How to recognize and avoid them
In this Help Net Security video, Aaron Walton, Threat Intel Analyst at Expel, discusses travel scams. For the past 18 months, the Expel SOC team has observed a campaign …
![CISO](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/09065945/eyes-400x200.webp)
Valuable insights for making the right cybersecurity decisions
This article compiles excerpts from various reports, presenting statistics and insights that could be helpful for CISOs. CISOs becoming more comfortable with risk levels …
![X](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/10171257/x-twitter-1500-400x200.webp)
How AI-powered software spreads Russian disinformation on X
The US Justice Department (DoJ) has seized two US-based domains used by Russian threat actors to create fake profiles on X (formerly Twitter) that would spread disinformation …
![zero day](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/10142903/zero_day-1-1500-400x200.webp)
Zero-day patched by Microsoft has been exploited by attackers for over a year (CVE-2024-38112)
CVE-2024-38112, a spoofing vulnerability in Windows MSHTML Platform for which Microsoft has released a fix on Tuesday, has likely been exploited by attackers in the wild for …
![Google Advanced Protection Program](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/10125447/google_advanced_protection_program-400x200.webp)
Google removes enrollment barrier for prospective Advanced Protection Program users
Google has removed a potential obstacle for high-risk users who want to enroll in the company’s Advanced Protection Program (APP): they can now do it just by setting a …
![executives](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/06113627/executives-400x200.jpg)
Diversifying cyber teams to tackle complex threats
Technologies such as GenAI, ML and IoT are giving threat actors new tools that make it easier to target consumers and organizations. From Savvy Seahorse which lures victims …
![Jake King](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/24132843/jake_king-2-elastic_security_labs-400x200.webp)
How companies increase risk exposure with rushed LLM deployments
In this Help Net Security interview, Jake King, Head of Threat & Security Intelligence at Elastic, discusses companies’ exposure to new security risks and …
![BunkerWeb](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/06152006/bunkerweb-open_source-waf-400x200.webp)
BunkerWeb: Open-source Web Application Firewall (WAF)
BunkerWeb is an open-source Web Application Firewall (WAF) distributed under the AGPLv3 free license. The solution’s core code is entirely auditable by a third party and …
![cybersecurity jobs](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/11140416/cybersecurity_jobs-1-1500-400x200.webp)
Cybersecurity jobs available right now: July 10, 2024
CISO HoneyBook | Israel | On-site – View job details As a CISO, you will develop and implement a multi-year security strategy and roadmap to anticipate and address …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders