![HP faxploit](https://img.helpnetsecurity.com/wp-content/uploads/2018/08/09100422/HP-attack-faxploit-400x200.jpg)
Criminals can compromise company networks by sending malicious faxes
Check Point has revealed details about the two critical remote code execution vulnerabilities (CVE-2018-5924, CVE-2018-5925) it discovered in the communication protocols used …
![hybrid IT](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104712/hybrid-400x200.jpg)
Faster, simpler, smaller, smarter: A cybersecurity dream becomes reality
More ports, same space, faster speeds, simpler deployment, foolproof configuration, fully scalable and a smarter way to protect your network. Sounds like an IT professional’s …
![arrows](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111503/abstract-arrows-400x200.jpg)
Week in review: IoT security, cyber hygiene, Social Mapper
Here’s an overview of some of last week’s most interesting news and articles: Intensifying DDoS attacks: Choosing your defensive strategy One of the biggest …
![mpos](https://img.helpnetsecurity.com/wp-content/uploads/2018/08/09100428/mpos-1600-400x200.jpg)
Vulnerabilities in mPOS devices could lead to fraud and theft
Vulnerabilities in mPOS (mobile point-of-sale) machines could allow malicious merchants to defraud customers and attackers to steal payment card data, Positive Technologies …
![magnify](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105905/magnify-400x200.jpg)
Social Mapper: A free tool for automated discovery of targets’ social media accounts
Trustwave has released Social Mapper, an open source tool that automates the process of discovering individuals’ social media accounts. How Social Mapper works The tool …
![airplane](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111910/airplane-400x200.jpg)
IoT malware found hitting airplanes’ SATCOM systems
In 2014, IOActive researchers revealed security vulnerabilities they found in the most widely deployed satellite communications terminals and presented potential scenarios …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103155/patch-400x200.jpg)
August Patch Tuesday forecast: Looking ahead after a frustrating July
Approaching August Patch Tuesday, we are supposed to be in the ‘dog days’ of summer where everything slows down. Unfortunately, July was full of CVEs and stability fixes with …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110009/industry-400x200.jpg)
The future of OT security in critical infrastructure
Both the likelihood and consequences of cyberattacks to OT/ICS components continue to grow for modern industrial operations. While current advances in OT/ICS cyber security …
![Black Hat USA 2018](https://img.helpnetsecurity.com/wp-content/uploads/2018/08/09100437/bhusa-gallery-2-400x200.jpg)
Photo gallery: Black Hat USA 2018, part 2
Black Hat USA 2018 is underway at Las Vegas. Here are a few photos from the Business Hall. Featured companies: LogRhythm, Carbon Black, Swimlane, Qualys, Cofense, Vectra, …
![smart city building light](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104005/smart-city-400x200.jpg)
Smart cities are exposed to old-school threats
Spurred by the false alarm that made Hawaii residents fear for their lives earlier this year, IBM X-Force Red and Threatcare researchers have decided to test several smart …
![leak](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113929/leak-400x200.jpg)
A botnet of smart irrigation systems can deplete a city’s water supply
Ben-Gurion University of the Negev (BGU) cyber security researchers warn of a potential distributed attack against urban water services that uses a botnet of smart irrigation …
![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111027/strategy-400x200.jpg)
There’s a global divide in how organizations assess cyber risk
Nearly 48 percent of organizations globally have embraced strategic vulnerability assessment – defined as mature or moderately mature programs that include targeted and …
Featured news
Resources
Don't miss
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)
- Arvest Bank CISO on building a strong cybersecurity culture in banking
- Review: Inside Cyber Warfare, 3rd Edition