![atlassian confluence](https://img.helpnetsecurity.com/wp-content/uploads/2022/06/03160359/atlassian_confluence2-400x200.jpg)
Unpatched Atlassian Confluence zero-day exploited, fix expected today (CVE-2022-26134)
A critical zero-day vulnerability (CVE-2022-26134) in Atlassian Confluence Data Center and Server is under active exploitation, the software maker has warned on Thursday. …
![](https://img.helpnetsecurity.com/wp-content/uploads/2022/06/02113743/infosec_week-1200-03062022-400x200.jpg)
New infosec products of the week: June 3, 2022
Here’s a look at the most interesting products from the past week, featuring releases from ESET, Kingston Digital, SecureAuth, SecurityMetrics, Semperis, and Traceable AI. …
![gears](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093421/gears-400x200.jpg)
40% of enterprises don’t include business-critical systems in their cybersecurity monitoring
Logpoint has announced findings from a recent poll to uncover the security and cost implications enterprises face with their existing IT infrastructure. The poll was targeted …
![chess](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104710/chess-1-400x200.jpg)
Intelligence is key to strategic business decisions
Businesses have a growing need for greater relevance in the intelligence they use to inform critical decision-making. Currently just 18% of professionals responsible for …
![Microsoft Office](https://img.helpnetsecurity.com/wp-content/uploads/2022/06/02115800/office-400x200.jpg)
Microsoft Office apps are vulnerable to IDN homograph attacks
Microsoft Office apps – including Outlook – are vulnerable to homograph attacks based on internationalized domain names (IDNs). In practice, this means that users …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094216/brain-400x200.jpg)
Concentric’s AI technologies simplify and automate data security
Visit Concentric AI at RSA Conference 2022 – Early Stage Expo in the South Hall on the second level, booth 18. You’ll be able to see their product in action and …
![woman](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105018/woman-400x200.jpg)
How to support women in cybersecurity
Cybersecurity is required to be a dynamic industry because cybercriminals don’t take days off. Cybersecurity professionals must be innovative, creative, and attentive to keep …
![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
Massive shadow code risk for world’s largest businesses
Source Defense announced the results of a study that for the first time sizes the security, privacy, and compliance risks that are literally designed into the digital supply …
![BEC scams](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094520/bec-400x200.jpg)
Language-based BEC attacks rising
Armorblox released a report which highlights the use of language-based attacks that bypass existing email security controls. The report uncovers how the continued increase in …
![Car](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112931/car-hacking-400x200.jpg)
Autonomous vehicles can be tricked into erratic driving behavior
When a driverless car is in motion, one faulty decision by its collision-avoidance system can lead to disaster, but researchers at the University of California, Irvine have …
![FluBot](https://img.helpnetsecurity.com/wp-content/uploads/2022/06/01133217/flubot_spyware-400x200.jpg)
FluBot takedown: Law enforcement takes control of Android spyware’s infrastructure
An international law enforcement operation involving 11 countries has disrupted the spreading of the FluBot Android malware, which spreads via SMS and MMS and steals sensitive …
![SASE](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/14135733/sase-hns-400x200.jpg)
Paving your path to SASE: 4 tips for achieving connectivity and security
Today, optimized network connectivity and security are both first-class citizens; IT teams can no longer sacrifice one for the other. As the number of distributed workers …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality