Please turn on your JavaScript for this page to function normally.
women in cybersecurity
Women rising in cybersecurity roles, but roadblocks remain

The ISC2 study on women in cybersecurity, a comprehensive research effort that collected responses from 2,400 women, has revealed several significant findings. These include …

Phishing
AI-driven phishing attacks deceive even the most aware users

Vishing and deepfake phishing attacks are on the rise as attackers leverage GenAI to amplify social engineering tactics, according to Zscaler. AI automates and personalizes …

CVE
Why cloud vulnerabilities need CVEs

When considering vulnerability management’s purpose in a modern world, it’s imperative to recognize the huge transition to new technologies and how you manage risk …

Charly Davis
Making cybersecurity more appealing to women, closing the skills gap

In this Help Net Security interview, Charly Davis, CCO at Sapphire, provides insights into the current challenges and barriers women face in the cybersecurity industry. Davis …

cybersecurity jobs
Cybersecurity jobs available right now: May 1, 2024

Some of the jobs listed here are no longer accepting applications. For a fresh list of open cybersecurity jobs, go here. Adversary Simulation Specialist LyondellBasell | …

zero trust
Essential steps for zero-trust strategy implementation

63% of organizations worldwide have fully or partially implemented a zero-trust strategy, according to Gartner. For 78% of organizations implementing a zero-trust strategy, …

Infosec products of the month
Infosec products of the month: April 2024

Here’s a look at the most interesting products from the past month, featuring releases from: Akamai, Bitdefender, CyberInt, Fastly, Forcepoint, IDnow, Immuta, Index Engines, …

law
FCC fines major wireless carriers over illegal location data sharing

The Federal Communications Commission (FCC) fined the nation’s largest wireless carriers for illegally sharing access to customers’ location information without consent and …

Palo Alto Networks
Palo Alto firewalls: CVE-2024-3400 exploitation and PoCs for persistence after resets/upgrades

There are proof-of-concept techniques allowing attackers to achieve persistence on Palo Alto Networks firewalls after CVE-2024-3400 has been exploited, the company has …

Mike Lemberger
Triangulation fraud: The costly scam hitting online retailers

In this Help Net Security interview, Mike Lemberger, Visa’s SVP, Chief Risk Officer, North America, discusses the severe financial losses resulting from triangulation fraud, …

Tracecat
Tracecat: Open-source SOAR

Tracecat is an open-source automation platform for security teams. The developers believe security automation should be accessible to everyone, especially understaffed small- …

passwords
Passwords under seven characters can be easily cracked

Any password under seven characters can be cracked within a matter of hours, according to Hive Systems. The time it takes to crack passwords increases Due to the widespread …

Don't miss

Cybersecurity news