Please turn on your JavaScript for this page to function normally.
microsoft cybersecurity dilemma
Microsoft’s cybersecurity dilemma: An open letter to Satya Nadella

Microsoft is suffering cybersecurity failures due to systemic problems with strategic leadership. The world is witnessing an alarming trend of cybersecurity issues with …

Koma Gandy
Exploring the root causes of the cybersecurity skills gap

In this Help Net Security interview, Koma Gandy, VP of Leadership and Business at Skillsoft, addresses the critical aspects of the cybersecurity skills gap, the need for …

shadow egineering
Shadow engineering exposed: Addressing the risks of unauthorized engineering practices

Shadow engineering is present in many organizations, and it can lead to security, compliance, and risk challenges. In this Help Net Security video, Darren Meyer, Staff …

TeamViewer
TeamViewer: Network segmentation hobbled Midnight Blizzard’s attack

TeamViewer, the company developing the popular remote access/control software with the same name, has finished the investigation into the breach it detected in late June 2024, …

decryption tool
Decryptor for DoNex, Muse, DarkRace, (fake) LockBit 3.0 ransomware released

A cryptographic weakness in the DoNex ransomware and its previous incarnations – Muse, fake LockBit 3.0, and DarkRace – has allowed Avast researchers to create a …

Patch Tuesday
July 2024 Patch Tuesday forecast: The end of an AV giant in the US

July 2024 Patch Tuesday is now live: Microsoft fixes two zero-days exploited by attackers (CVE-2024-38080, CVE-2024-38112) The US celebrated Independence Day last week, …

Rob Greer
How nation-state cyber attacks disrupt public services and undermine citizen trust

In this Help Net Security interview, Rob Greer, VP and GM of the Enterprise Security Group at Broadcom, discusses the impact of nation-state cyber attacks on public sector …

Monocle
Monocle: Open-source LLM for binary analysis search

Monocle is open-source tooling backed by a large language model (LLM) for performing natural language searches against compiled target binaries. Monocle can be provided with a …

cybersecurity skills gap
Organizations change recruitment strategies to find cyber talent

An estimated 4 million professionals are needed to fill the growing cybersecurity workforce gap, according to Fortinet. At the same time, Fortinet’s 2024 Global …

cybersecurity week in review
Week in review: A need for a DDoS response plan, human oversight in AI-enhanced software development

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 4 key steps to building an incident response plan In this Help Net Security …

cybercrime
Infostealing malware masquerading as generative AI tools

Over the past six months, there has been a notable surge in Android financial threats – malware targeting victims’ mobile banking funds, whether in the form of …

99% of IoT exploitation attempts rely on previously known CVEs

The explosion of Internet of Things (IoT) devices has brought about a wide range of security and privacy challenges, according to Bitdefender and NETGEAR. The report is based …

Don't miss

Cybersecurity news