![brain](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/03114206/brain-400x200.jpg)
Balancing AI’s promise with privacy and intellectual property concerns
Organizations increasingly integrate AI technologies into their cybersecurity architectures to enhance detection, response, and mitigation capabilities. One of the key …
![Subdominator](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/13150759/subdominator-1400-400x200.jpg)
Subdominator: Open-source tool for detecting subdomain takeovers
Subdominator is a dependable and fast open-source command-line interface tool to identify subdomain takeovers. It boasts superior accuracy and reliability, offering …
![ALPHV Blackcat](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/19164856/alphv-blackcat-1400-400x200.jpg)
Law enforcement seizes ALPHV/Blackcat sites, offers decryptor to victims
The US Justice Department announced today a disruption campaign against the Blackcat/ALPHV ransomware group and let victims know that there is a decryptor they can use. FBI …
![mr. Cooper](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/19105220/mrcooper-1400-400x200.jpg)
Mr. Cooper breach exposes sensitive info of over 14 million customers
Mortgage company Mr. Cooper has confirmed that personal information of over 14.6 million customers has been exposed in its October 2023 data breach. The breach “On …
![SSH](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/19110357/ssh-1400-400x200.jpg)
SSH vulnerability exploitable in Terrapin attacks (CVE-2023-48795)
Security researchers have discovered a vulnerability (CVE-2023-48795) in the SSH cryptographic network protocol that could allow an attacker to downgrade the …
![large language models](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11160752/llms-2-400x200.jpg)
The impact of prompt injection in LLM agents
Prompt injection is, thus far, an unresolved challenge that poses a significant threat to Language Model (LLM) integrity. This risk is particularly alarming when LLMs are …
![EMBA](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/13133203/emba-security_analyzer-1300-400x200.jpg)
EMBA: Open-source security analyzer for embedded devices
The EMBA open-source security analyzer is tailored as the central firmware analysis tool for penetration testers and product security groups. It assists throughout the …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27171242/ransomware-1-400x200.jpg)
Ransomware trends and recovery strategies companies should know
Ransomware attacks can have severe consequences, causing financial losses, reputational damage, and operational disruptions. The methods used to deliver ransomware vary, …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25142723/cloudfiles1-400x200.jpg)
Most cloud transformations are stuck in the middle
The landscape of enterprise technology continues to evolve rapidly, with cloud transformation as a primary investment, according to HFS and IBM Consulting. Yet, most …
![printer](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/14114130/printer-windows-400x200.jpg)
Microsoft is working on a more secure print system for Windows
After announcing a gradual elimination of third-party printer drivers on Windows earlier this year, Microsoft has now unveiled its plan for enhancing security by introducting …
![Qakbot](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/30133913/qakbot-hns-400x200.jpg)
Qakbot returns in fresh assault on hospitality sector
The Qakbot botnet has been disrupted this summer, but cybercriminals are not ready to give up on the malware: Microsoft’s threat analysts have spotted a new phishing …
![MongoDB](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/18103148/mongodb-1400-400x200.jpg)
MongoDB corporate systems breached, customer data exposed
Database management company MongoDB has suffered a breach: attackers have gained access to some of its corporate systems and customer data and metadata. The MongoDB breach …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?