![Fortra GoAnywhere](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/24134218/fortra-anywhere-1400-400x200.jpg)
PoC for easily exploitable Fortra GoAnywhere MFT vulnerability released (CVE-2024-0204)
Proof-of-concept (PoC) exploit code for a critical vulnerability (CVE-2024-0204) in Fortra’s GoAnywhere MFT solution has been made public, sparking fears that attackers …
![vulnerability](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/12091424/vulnerability-broken-400x200.jpg)
The effect of omission bias on vulnerability management
Whether we’d like to admit it to ourselves or not, all humans harbor subconscious biases that powerfully influence our behavior. One of these is the omission bias, which has …
![cybersecurity conferences](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/18190951/cybersecurity-conferences-1400-400x200.jpg)
10 USA cybersecurity conferences you should visit in 2024
Security BSides Security BSides offers attendees an opportunity to engage and present their ideas actively. Characterized by its intensity, these events are filled with …
![Randy Marchany](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/17140152/randy_marchany-2-virginia_tech-400x200.jpg)
Prioritizing CIS Controls for effective cybersecurity across organizations
In this Help Net Security interview, Randy Marchany, CISO at Virginia Tech, discusses the challenges and strategies associated with implementing CIS Controls in organizations …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27171242/ransomware-1-400x200.jpg)
Organizations invest more in data protection but recover less
92% of organizations will increase 2024 data protection spend, to achieve cyber resilience amidst continued threats of ransomware and cyberattacks, according to Veeam …
![supply chain](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/12152237/supply_chain-1400-400x200.jpg)
Software supply chain attacks are getting easier
ReversingLabs identified close to 11,200 unique malicious packages across three major open-source software platforms in 2023: npm, PyPI, and RubyGems. These findings mark an …
![keys](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/26142233/keys3-400x200.jpg)
Whitepaper: MFA misconceptions
While a valuable tool in the cybersecurity toolkit, MFA is not immune to weaknesses. Read the “MFA Misconceptions” whitepaper to understand its limitations and how …
![Stolen Device Protection for iPhone](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/23120056/stolen_device_protection_iphone-1400-400x200.jpg)
Apple debuts new feature to frustrate iPhone thieves
Besides fixing an actively exploited zero-day vulnerability, the latest update for the iOS 17 branch offers a new feature to help you protect your accounts and sensitive …
![Apple](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/01103731/apple-network-400x200.jpg)
Apple fixes actively exploited WebKit zero-day (CVE-2024-23222)
Apple has fixed an actively exploited zero-day vulnerability (CVE-2024-23222) that affects Macs, iPhones, iPads and AppleTVs. About CVE-2024-23222 CVE-2024-23222 is a type …
![Trello](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/23111837/trello-1400-400x200.jpg)
Data of 15 million Trello users scraped and offered for sale
Someone is selling scraped data of millions of users of Trello, a popular a web-based list-making application and project management platform, on a dark web hacker forum. The …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/07115823/locks-red-400x200.jpg)
Why cyberattacks mustn’t be kept secret
No company is immune to cyberattacks, but when the inevitable happens, too many companies still try to maintain a wall of silence. In fact, over half of security professionals …
![Jean-Philippe Aumasson](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/17140145/jean_philippe_aumasson-2-taurus-400x200.jpg)
Beyond blockchain: Strategies for seamless digital asset integration
In this Help Net Security interview, Jean-Philippe Aumasson, CSO at Taurus, emphasizes the often-overlooked complexities of key generation, storage, and distribution, …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?