Please turn on your JavaScript for this page to function normally.
cybersecurity jobs
Cybersecurity jobs available right now: January 21, 2025

Some of the jobs listed here are no longer accepting applications. For a fresh list of open cybersecurity jobs, go here. CISO Sempra Infrastructure | USA | Hybrid – No …

AnyDesk
CERT-UA warns against “security audit” requests via AnyDesk

Attackers are impersonating the Computer Emergency Response Team of Ukraine (CERT-UA) via AnyDesk to gain access to target computers. The request (Source: CERT-UA) …

crypto wallets
Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?

The twin cryptocurrency and digital identity revolutions are supposed to be building a better future, where anybody can take charge of their sovereignty and security in a …

Arunava Bag
AI-driven insights transform security preparedness and recovery

In this Help Net Security interview, Arunava Bag, CTO at Digitate, discusses how organizations can recover digital operations after an incident, prioritize cybersecurity …

GenAI
One in ten GenAI prompts puts sensitive data at risk

Despite their potential, many organizations hesitate to fully adopt GenAI tools due to concerns about sensitive data being inadvertently shared and possibly used to train …

cybersecurity week in review
Week in review: AWS S3 data encrypted without ransomware, data of 15k Fortinet firewalls leaked

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Attackers are encrypting AWS S3 data without using ransomware A ransomware …

russian flag
How Russian hackers went after NGOs’ WhatsApp accounts

Star Blizzard, a threat actor tied to the Russian Federal Security Service (FSB), was spotted attempting to compromise targets’ WhatsApp accounts through a clever …

Adam Bateman
Balancing usability and security in the fight against identity-based attacks

In this Help Net Security interview, Adam Bateman, CEO of Push Security, talks about the rise in identity-based attacks, how they’re becoming more sophisticated each year, and …

MSSqlPwner
MSSqlPwner: Open-source tool for pentesting MSSQL servers

MSSqlPwner is an open-source pentesting tool tailored to interact with and exploit MSSQL servers. Built on Impacket, it enables users to authenticate with databases using …

smart building
Homeowners are clueless about how smart devices collect their data

Homeowners are increasingly concerned about data privacy in smart home products, according to Copeland. Homeowners see smart devices as boosting home security Homeowners are …

Europe
EU takes decisive action on healthcare cybersecurity

The Commission has presented an EU action plan aimed at strengthening the cybersecurity of hospitals and healthcare providers. The initiative is an essential step in shielding …

Infosec products of the week
New infosec products of the week: January 17, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Atsign, Cisco, Commvault, and IT-Harvest. Cisco AI Defense safeguards against the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools