![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093806/cloud1-400x200.jpg)
Cloud native adoption increasing security concerns
Cloud native adoption has both transformed the way organizations build modern applications and resulted in increased security threats and concerns, according to a research by …
![Kubernetes](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093639/kubernetes-400x200.jpg)
Kubernetes adoption continues to grow
Portworx released findings from its survey which assesses the mass adoption and evolution of Kubernetes usage among enterprise users in the last 12 months, in addition to the …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094216/brain-400x200.jpg)
Counterfit: Open-source tool for testing the security of AI systems
After developing a tool for testing the security of its own AI systems and assessing them for vulnerabilities, Microsoft has decided to open-source it to help organizations …
![Exim](https://img.helpnetsecurity.com/wp-content/uploads/2021/05/04131615/exim-red-helpnetsecurity-400x200.jpg)
21 vulnerabilities found in Exim, update your instances ASAP!
A code audit of Exim, a widely used mail transfer agent, has revealed 21 previously unknown vulnerabilities, some of which can be chained together to achieve unauthenticated …
![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
Is it OK to publish PoC exploits for vulnerabilities and patches?
In the wake of the Microsoft Exchange ProxyLogon zero-day and F5 BIG-IP security exploits earlier this year, many are questioning if and when should researchers publish proof …
![thief](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095826/thief-400x200.jpg)
Defeating typosquatters: Staying ahead of phishing and digital fraud
It has become a mantra for businesses targeted by hackers to describe the incident as a “sophisticated cyber-attack”. Although true in some instances, the reality is that most …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101722/laptop-400x200.jpg)
How modern workflows can benefit from pentesting
Pentesting, also known as penetration testing, is a security assessment, an analysis, and progression of simulated attacks on an application (web, mobile, or API) or network …
![drown](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093451/drown-400x200.jpg)
61% of cybersecurity teams are understaffed
The pandemic’s disruption has rippled across the globe, impacting workforces in nearly every sector. However, according to the findings from a survey report from ISACA and HCL …
![Cybersecurity risk management](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092752/cybersecurity_risk_management-400x200.jpg)
Pandemic accelerating need for insider risk management
As companies exit the pandemic, security leaders will be challenged with new data security complexities. Remote work over the past year magnified challenges that companies …
![fake](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/05115557/fake2-400x200.jpg)
Social media feed simulator Fakey teaches users to recognize credible content
As people around the world increasingly get their news from social media, online misinformation has emerged as an area of great concern. Social media feed simulator Fakey To …
![Cynet InfoSec Leaders Community](https://img.helpnetsecurity.com/wp-content/uploads/2021/05/04132336/cynet-community-400x200.png)
New community to gives cybersecurity leaders outside the Fortune 2000 a forum to collaborate
Perhaps due to the nature of the position, the InfoSec leadership roles tend to be solitary ones. CISOs, or their equivalent decision-makers in organizations without the role, …
![Apple](https://img.helpnetsecurity.com/wp-content/uploads/2021/02/19160906/apple-lock-400x200.jpg)
Apple fixes four zero-days under attack
A week after Apple patched a macOS zero-day exploited by Shlayer malware for months for months, the company has released new security updates for macOS, iOS, iPadOS and watch …