![How attackers abuse Microsoft MFA](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/24163302/abuse_mfa-400x200.jpg)
How attackers use and abuse Microsoft MFA
Microsoft has been pushing for the use of multi-factor authentication (MFA) to thwart attackers for many years. But threat actors are keeping up with the increasing enterprise …
![GitLab](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/24123913/gitlab-24082022-01-400x200.jpg)
Critical RCE bug in GitLab patched, update ASAP! (CVE-2022-2884)
GitLab has fixed a remote code execution vulnerability (CVE-2022-2884) affecting the Community and the Enterprise Edition of its DevOps platform, and has urged admins to …
![Andrew Almeida](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/18110321/andrew_almeida-2-thomabravo-400x200.jpg)
Thoma Bravo: Securing digital identities has become a major priority
Thoma Bravo is a private equity firm with a 40+ year history, including over $114 billion in assets under management, and a focus on investing in software and technology …
![DevOps](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093217/DevOps-400x200.jpg)
Is security becoming a priority for DevOps teams?
GitLab released the results of its annual DevSecOps survey which highlights the continued prioritization of security and compliance, investment in toolchain consolidation, and …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101141/tools2-400x200.jpg)
Lean security 101: 3 tips for building your framework
Cobalt, Lazarus, MageCart, Evil, Revil — cybercrime syndicates spring up so fast it’s hard to keep track. Until they infiltrate your system. But you know what’s even more …
![malware analysis tools](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/19153941/malware-analysis-tools-hns-400x200.jpg)
7 open-source malware analysis tools you should try out
There are two main types of malware analysis: static and dynamic. Performing static analysis of a malicious binary means concentrating on analyizing its code without executing …
![code](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095702/code-magnify-400x200.jpg)
API security incidents occur at least once a month
Postman released the results of its 2022 State of the API Report, which surveyed more than 37,000 developers and API professionals on a range of topics, including their …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105254/ddos_attacks-400x200.jpg)
DDoS attacks jump 203%, patriotic hacktivism surges
Radware released a report revealing that the number of malicious DDoS attacks climbed by 203% compared to the first six months of 2021. The report also underscores how …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112443/hand-400x200.jpg)
Fake DDoS protection pages are delivering malware!
Malware peddlers are exploiting users’ familiarity with and inherent trust in DDoS protection pages to make them download and run malware on their computer, Sucuri …
![Office 365](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092801/office365-400x200.jpg)
Escanor malware delivered in weaponized Microsoft Office documents
Resecurity, a Los Angeles-based cybersecurity company protecting Fortune 500 worldwide, identified a new RAT (Remote Administration Tool) advertised in Dark Web and Telegram …
![snake, threat](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/21113121/snake-coiled-400x200.jpg)
Disk wiping malware knows no borders
Fortinet announced the latest semiannual FortiGuard Labs Global Threat Landscape Report which revealed that ransomware threat continues to adapt with more variants enabled by …
![cloud hand](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110822/cloud-hand-400x200.jpg)
How vulnerable supply chains threaten cloud security
Organizations are struggling to sufficiently secure new cloud environments implemented during the pandemic, while maintaining legacy equipment and trying to adapt their …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality