![LockBit](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/26145946/lockbit-hands-400x200.jpg)
Ransomware disrupts Indonesia’s national data centre, LockBit gang claims US Federal Reserve breach
Ransomware attackers wielding a LockBit variant dubbed Brain Cipher have disrupted a temporary national data center facility which supports the operations of 200+ Indonesian …
![SnailLoad](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/25102753/snailload-1500-400x200.webp)
New security loophole allows spying on internet users’ online activity
Researchers at Graz University of Technology were able to spy on users’ online activities simply by monitoring fluctuations in the speed of their internet connection. …
![Zeek](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/18165958/zeek-1500-400x200.webp)
Zeek: Open-source network traffic analysis, security monitoring
Zeek is an open-source network analysis framework. Unlike an active security device such as a firewall, Zeek operates on a versatile ‘sensor’ that can be a …
![Kunal Modasiya](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/24114524/kunal_modasiya-2-qualys-400x200.webp)
CISOs’ new ally: Qualys CyberSecurity Asset Management 3.0
In this Help Net Security interview, Kunal Modasiya, VP of Product Management and Growth at Qualys, explores the key features, significant advantages, and innovative …
![cybersecurity funding activity](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/19145401/cybersecurity_funding_activity-1500-400x200.webp)
Breaking down the numbers: Q2 2024 cybersecurity funding activity recap
We present a list of selected cybersecurity companies that received funding during the second quarter of 2024 (Q2 2024). Alethea April | $20 million Alethea closed a $20 …
![Guide to mitigating credential stuffing attacks](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/19112221/mitigating_credential_stuffing_attacks-1500-400x200.webp)
Guide to mitigating credential stuffing attacks
We have a collective unaddressed weakness when it comes to basic cybersecurity. Out of the many reports circulating in the news today, many statistics revolve around the …
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/24133618/android-danger-400x200.webp)
Open-source Rafel RAT steals info, locks Android devices, asks for ransom
The open-source Rafel RAT is being leveraged by multiple threat actors to compromise Android devices and, in some cases, to lock them, encrypt their contents, and demand money …
![faking data breaches](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/21135908/faking_data_breaches-1500-400x200.webp)
Why are threat actors faking data breaches?
Earlier this year Europcar discovered a hacker selling info on its 50 million customers on the dark web. The European car rental company immediately launched an investigation, …
![botnet](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/15161411/botnet-400x200.webp)
1 out of 3 breaches go undetected
Organizations continue to struggle in detecting breaches as they become more targeted and sophisticated, with more than 1 out of 3 organizations citing their existing security …
![cracking down on cybercrime](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/20155853/cracking_down_on_cybercrime-1500-400x200.webp)
Cracking down on cybercrime: Who you gonna call?
As cybercrime continues to grow, law enforcement agencies worldwide face increased challenges in safeguarding organizations and individuals. In this article, we highlight law …
![cybersecurity week in review](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/25124834/cybersecurity-week-review-3-1500-400x200.webp)
Week in review: CDK Global cyberattack, critical vCenter Server RCE fixed
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: The rise of SaaS security teams In this Help Net Security interview, Hillary …
![Intel](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/21133009/intel-1500-400x200.webp)
Intel-powered computers affected by serious firmware flaw (CVE-2024-0762)
A vulnerability (CVE-2024-0762) in the Phoenix SecureCore UEFI, which runs on various Intel processors, could be exploited locally to escalate privileges and run arbitrary …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD