![patch tuesday](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/12093057/patch-tuesday-computers-400x200.jpg)
December 2023 Patch Tuesday: 33 fixes to wind the year down
Microsoft’s December 2023 Patch Tuesday is a light one: 33 patches, only four of which are deemed critical. “This month, Microsoft did not patch any zero-day …
![Log4j](https://img.helpnetsecurity.com/wp-content/uploads/2021/12/15084101/log4j-hns-face-400x200.jpg)
Lazarus exploit Log4Shell vulnerability to deliver novel RAT malware
North Korea-backed group Lazarus has been spotted exploiting the Log4Shell vulnerability (CVE-2021-44228) and novel malware written in DLang (i.e., the memory-safe D …
![recruiters beware](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/12143220/recruiters-beware-400x200.jpg)
Recruiters, beware of cybercrooks posing as job applicants!
Recruiters are being targeted via spear-phishing emails sent by cybercrooks impersonating job applicants, Proofpoint researchers are warning. “The tone and content of …
![Windows injection](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/12115557/windows-syringe-400x200.jpg)
“Pool Party” process injection techniques evade EDRs
SafeBreach researchers have discovered eight new process injection techniques that can be used to covertly execute malicious code on Windows systems. Dubbed “Pool …
![passwords](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/02181830/passwords-1-400x200.jpg)
Many popular websites still cling to password creation policies from 1985
A significant number of popular websites still allow users to choose weak or even single-character passwords, researchers at Georgia Institute of Technology have found. …
![EU](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100615/EU-lock-400x200.jpg)
eIDAS: EU’s internet reforms will undermine a decade of advances in online security
The European Union’s attempt to reform its electronic identification and trust services – a package of laws better known as eIDAS 2.0 – contains legislation that poses a grave …
![Matt Holland](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/30120827/matt_holland-2-field_effect-400x200.jpg)
Balancing AI advantages and risks in cybersecurity strategies
In this Help Net Security interview, Matt Holland, CEO of Field Effect, discusses achieving a balance for businesses between the advantages of using AI in their cybersecurity …
![Nemesis](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/08084843/nemesis-specterops-1400-400x200.jpg)
Nemesis: Open-source offensive data enrichment and analytic pipeline
Nemesis is a centralized data processing platform that ingests, enriches, and performs analytics on offensive security assessment data (i.e., data collected during penetration …
![smartphone](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/08132040/smartphone-lock-400x200.jpg)
WhatsApp, Slack, Teams, and other messaging platforms face constant security risks
42% of businesses report employees with BYOD devices in business settings that use tools like WhatsApp have led to new security incidents, according to SafeGuard Cyber. …
![certificates](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/26115302/certificates1-400x200.jpg)
Why are IT professionals not automating?
As an IT professional, you understand the value of automation, and like many IT experts, you may approach it with a mix of excitement and apprehension. Automation is a …
![Mike Regan](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/30124308/mike_regan-2-tiaonline-400x200.jpg)
SCS 9001 2.0 reveals enhanced controls for global supply chains
In this Help Net Security interview, Mike Regan, VP of Business Performance at TIA, discusses SCS 9001 Release 2.0, a certifiable standard crafted to assist organizations in …
![identity](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102125/identity2-400x200.jpeg)
Cybercriminals continue targeting open remote access products
Cybercriminals still prefer targeting open remote access products, or like to leverage legitimate remote access tools to hide their malicious actions, according to WatchGuard. …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?