![Siemens LOGO!](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094229/siemens-logo-400x200.jpg)
Siemens LOGO!, a PLC for small automation projects, open to attack
LOGO!, a programmable logic controller (PLC) manufactured by Siemens, sports three vulnerabilities that could allow remote attackers to reconfigure the device, access project …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112007/biohazard-2-400x200.jpg)
Researchers fight ransomware attacks by leveraging properties of flash-based storage
Ransomware continues to pose a serious threat to organizations of all sizes. In a new paper, “Project Almanac: A Time-Traveling Solid State Drive,” University of …
![SailPoint Predictive Identity platform](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094239/SPI-modeling-400x200.png)
New infosec products of the week: May 31, 2019
SailPoint Predictive Identity platform: The future of identity governance SailPoint unveiled the SailPoint Predictive Identity platform, the intelligent cloud identity …
![colors](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100157/colors-400x200.jpg)
What mechanisms can help address today’s biggest cybersecurity challenges?
In this Help Net Security podcast, Syed Abdur Rahman, Director of Products with unified risk management provider Brinqa, talks about their risk centric knowledge-driven …
![see](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100214/see-400x200.jpg)
Researchers spot manipulated photos and video using AI-driven imaging system
To thwart sophisticated methods of altering photos and video, researchers at the NYU Tandon School of Engineering have demonstrated an experimental technique to authenticate …
![WordPress](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104602/wordpress-biohazard-400x200.jpg)
Attackers are exploiting WordPress plugin flaw to inject malicious scripts
Attackers are leveraging an easily exploitable bug in the popular WP Live Chat Support plugin to inject a malicious JavaScript in vulnerable sites, Zscaler warns. The company …
![Gmail](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101219/gmail-400x200.png)
G Suite to get Gmail confidential mode, on by default
Earlier this year, Google introduced Gmail confidential mode for both consumer and G Suite users. While the former were able to use it immediately, the latter depended on …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100605/healthcare-400x200.jpg)
A veteran’s look at the cybersecurity industry and the problems that need solving
For many in the infosec industry, Daniel Miessler needs no introduction, as he’s a 20-year industry veteran, a professional that fulfilled a variety of security roles at …
![Money](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094237/dollars-400x200.jpg)
Majority of CISOs plan to ask for an increase in cybersecurity investment
Most CISOs of financial institutions (73 percent) plan to ask their organization’s CFO for an increase in cybersecurity investments in the next year, according to the …
![Broken glass](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195722/glass-262105_1920-400x200.jpg)
Security overconfidence and immaturity continue to endanger organizations
The majority of organizations are ill-prepared to protect themselves against privileged access abuse, the leading cyber-attack vector, according to Centrify and Techvangelism. …
![connected house](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104916/connected-house-400x200.jpg)
New initiative aims to strengthen IoT security, interoperability and reliability
The Zigbee Alliance publicly announced a major ongoing initiative to make smart home and IoT products easier to develop, deploy, and sell across ecosystems. The All Hubs …
![keys](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110707/keys-400x200.jpg)
Businesses are struggling to implement adequate IAM and PAM processes, practices and technologies
Businesses find identity and access management (IAM) and privileged access management (PAM) security disciplines difficult yet un-concerning. The results infer that IAM- and …
Featured news
Sponsored
Don't miss
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes