![Microsoft Outlook](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/05120123/microsoft-outlook-1400-400x200.jpg)
Russian hackers use old Outlook vulnerability to target Polish orgs (CVE-2023-23397)
Russian state-backed hacking group Forest Blizzard (aka Fancy Bear, aka APT28) has been using a known Microsoft Outlook vulnerability (CVE-2023-23397) to target public and …
![SessionProbe](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/04123625/sessionprobe-pentesting-tool-1400-400x200.jpg)
SessionProbe: Open-source multi-threaded pentesting tool
SessionProbe is a multi-threaded pentesting tool designed to evaluate user privileges in web applications. It takes a user’s session token and checks for a list of URLs …
![API](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/26141959/api2-400x200.jpg)
How AI is revolutionizing “shift left” testing in API security
Catching coding errors in API preproduction, before they are spun up and go live is critical in preventing exploitable vulnerabilities. It’s why we’ve seen “shift left” become …
![Carl Froggett](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/16123753/carl_froggett-2-deepinstinct-400x200.jpg)
Advanced ransomware campaigns expose need for AI-powered cyber defense
In this Help Net Security interview, Carl Froggett, CIO at Deep Instinct, discusses emerging trends in ransomware attacks, emphasizing the need for businesses to use advanced …
![data analytics](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11203448/data_analytics2-400x200.jpg)
2024 brings changes in data security strategies
2024 will be a revolutionary year for the data security landscape as Data Security Posture Management (DSPM) technology rapidly evolves to keep pace with the colossal amount …
![eBook: Defending the Infostealer Threat](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/26131131/ebook_infostealer-1400-400x200.jpg)
eBook: Defending the Infostealer Threat
Enterprises’ increasing digital reliance has fueled an array of cybersecurity threats. One rapidly growing area is information-stealing malware known as infostealers, which is …
![Registration Data Request Service (RDRS)](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/04152037/registration_data_request_service_rdrs-400x200.jpg)
RDRS: ICANN’s new service for easier access to nonpublic domain data
The Internet Corporation for Assigned Names and Numbers (ICANN) has launched the Registration Data Request Service (RDRS). The RDRS is a new service that introduces a more …
![water critical infrastructure](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/04121945/water-critical-infrastructure2-400x200.jpg)
CyberAv3ngers hit Unitronics PLCs at multiple US-based water facilities
Iran-affiliated attackers CyberAv3ngers continue to exploit vulnerable Unitronics programmable logic controllers (PLCs), US and Israeli authorities have said in a joint …
![warning scam](https://img.helpnetsecurity.com/wp-content/uploads/2023/02/27105638/warning-scam-400x200.jpg)
Booking.com customers targeted in hotel booking scam
Scammers are hijacking hotels’ Booking.com accounts and using them as part of a hotel booking scam aimed at tricking guests into sharing their payment card information. …
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28200747/eye-cyborg-400x200.jpg)
Put guardrails around AI use to protect your org, but be open to changes
Artificial intelligence (AI) is a topic that’s currently on everyone’s minds. While in some industries there is concern it could replace workers, other industries have …
![cybercriminals](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/08105601/cybercriminals-400x200.jpg)
2024 cybersecurity outlook: The rise of AI voice chatbots and prompt engineering innovations
In their 2024 cybersecurity outlook, WatchGuard researchers forecast headline-stealing hacks involving LLMs, AI-based voice chatbots, modern VR/MR headsets, and more in the …
![cybersecurity budget](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/27163444/cybersecurity_budget-1400-400x200.jpg)
Maximizing cybersecurity on a budget
A cybersecurity budget is an allocation of resources, both financial and otherwise, dedicated to protecting an organization’s digital assets from cyber threats. This …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?