A critical security flaw in Apache Struts is under attack, so patch now
Criminals are apparently using already available Proof-of-concept to attack Apache Struts......»»
NATO plans to deploy sea drones to monitor and protect undersea cables
Plans to protect critical undersea cables are being drawn up by NATO......»»
Businesses plagued by constant stream of malicious emails
36.9% of all emails received by businesses (20.5 billion) in 2024 were unwanted, according to Hornetsecurity’s analysis of 55.6+ billion emails processed through their security services between November 1, 2023 and October 31, 2024 – and.....»»
What makes for a fulfilled cybersecurity career
In this Help Net Security video, Richard Hummel, NETSCOUT’s Director of Threat Intelligence, talks about his journey into cybersecurity and offers insight for those that are interested in pursuing it as a career. The post What makes for a fulfi.....»»
Who handles what? Common misconceptions about SaaS security responsibilities
In this Help Net Security interview, James Dolph, CISO at Guidewire, addresses common misconceptions about security responsibilities in cloud environments, particularly in SaaS, and how these misunderstandings can lead to security risks. What common.....»»
Apple could tie up with Sony for a critical Vision Pro upgrade
Apple is reportedly working with Sony to add support for PlayStation VR 2 controller on the Vision Pro headset, a deal that covers more than just games......»»
Apple could tie with up with Sony for a critical Vision Pro upgrade
Apple is reportedly working with Sony to add support for PlayStation VR 2 controller on the Vision Pro headset, a deal that covers more than just games......»»
Week in review: Veeam Service Provider Console flaws fixed, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Veeam plugs serious holes in Service Provider Console (CVE-2024-42448, CVE-2024-42449) Veeam has fixed two vulnerabilities in Veeam Service Provider.....»»
Critical reporting weakens the effect of "sportswashing" for authoritarian regimes, experiment reveals
Major sporting events offer authoritarian regimes the opportunity to present themselves to the population of foreign states as progressive and open. However, this positive effect on image—or "sportswashing" for short—only works in other states wh.....»»
NASA flights map critical minerals from skies above western US
On a crystal-clear afternoon above a desert ghost town, a NASA aircraft scoured the ground for minerals. The plane, a high-altitude ER-2 research aircraft, had taken off early that morning from NASA's Armstrong Flight Research Center in Edwards, Cali.....»»
Resecurity introduces AI-powered GSOC at NATO Edge 2024
Resecurity, a global leader in cybersecurity solutions, unveiled its advanced Government Security Operations Center (GSOC) during NATO Edge 2024, the NATO Communications and Information Agency’s flagship conference. This year’s event, held from D.....»»
Echoworx enhances secure access to encrypted messages
Echoworx announced the addition of 2-Step Verification (2SV) when using OAuth and Passkeys for authentication for encrypted messages. This latest enhancement offers organizations an additional layer of security, addressing the growing demand for iden.....»»
How to choose secure, verifiable technologies?
The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has published a guidance document titled Choosing Secure and Verifiable Technologies, compiled to assist organizations in making informed decisions when procuring.....»»
New infosec products of the week: December 6, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Datadog, Fortinet, Radiant Logic, Sweet Security, Tenable, and Veza. FortiAppSec Cloud simplifies web application security management With FortiAppSec Cloud,.....»»
GenAI makes phishing attacks more believable and cost-effective
GenAI is a powerful tool that can be used by security teams to protect organizations, however, it can also be used by malicious actors, making phishing-related attacks a growing and concerning threat vector, according to Ivanti. Ivanti’s resear.....»»
Building a robust security posture with limited resources
In this Help Net Security interview, Gareth Lindahl-Wise, CISO at Ontinue, discusses how business leaders can align innovation with cybersecurity, tackle the risks posed by legacy systems, and build defenses for startups. Lindahl-Wise also highlights.....»»
December 2024 Patch Tuesday forecast: The secure future initiative impact
It seems like 2024 just started, but the final Patch Tuesday of the year is almost here! In retrospect, it has been a busy year with continued Windows 11 releases, the new Server 2025 release, and all the patches we’ve needed to deal with on Patch.....»»
Is Temtem cross-platform?
Temtem is one of the biggest Pokemon competitors out there, but does it solve the original's biggest flaw? Let's talk about cross-platform support in Temtem......»»
Longitudinal study reveals ethnic studies boosts critical thinking, equity awareness in high school students
High school students enrolled in ethnic studies develop the ability to think analytically about the causes of social inequalities, a University of Michigan study suggests......»»
Peer-brokered sales central to illegal drug trade
The thought of illegal drug sales evokes images of deals done on shady street corners. But a new study from Case Western Reserve University exposes a critical but underreported element of the illegal drug market: so-called "peer-brokered" sales......»»
Download: The Ultimate Guide to the CCSP
Even the brightest minds benefit from guidance on the journey to success. The Ultimate Guide to the CCSP covers everything you need to know about the world’s leading cloud security certification. Learn how CCSP – and ISC2 – can help you discove.....»»