Creating a formula for effective vulnerability prioritizationIn this Help Net Security interview, Michael Gorelik, CTO and Head of Malware Research at Morphisec, provides insights into the business impact of vulnerabilities.
EMBA: Open-source security analyzer for embedded devicesThe EMBA open-source security analyzer is tailored as the central firmware analysis tool for penetration testers and product security groups.
SSH vulnerability exploitable in Terrapin attacksSecurity researchers have discovered a vulnerability in the SSH cryptographic network protocol that could allow an attacker to downgrade the connection's security by truncating the extension negotiation message.
MongoDB corporate systems breached, customer data exposedDatabase management company MongoDB has suffered a breach: attackers have gained access to some of its corporate systems and customer data and metadata.
Microsoft is working on a more secure print system for WindowsAfter announcing a gradual elimination of third-party printer drivers on Windows earlier this year, Microsoft has now unveiled its plan for enhancing security by introducting Windows Protected Print Mode.
Mr. Cooper breach exposes sensitive info of over 14 million customersMortgage company Mr. Cooper has confirmed that personal information of over 14.6 million customers has been exposed in its October 2023 data breach.
Citrix Bleed leveraged to steal data of 35+ million Comcast Xfinity customersTelecommunications company Comcast has confirmed a breach that exposed personal information of more than 35.8 million of Xfinity customers.
Wiz and Apiiro partner to provide context-driven security from code to cloudIn this Help Net Security video interview, John Leon, VP of Ecosystems & Partnerships at Apiiro, discusses how the partnership and technical integration enables Wiz and Apiiro to share prioritized security findings with context, including inventory, vulnerabilities, issues, and configuration findings.
Supply chain emerges as major vector in escalating automotive cyberattacksIn this Help Net Security video, Jay Yaneza, Cybersecurity Architect at VicOne, discusses how, in the first half of the year, cyberattacks on the automotive sector caused losses exceeding $11 billion.
Information-blocking rule in 21st Century Cures Act redefines data exchange in healthcareA Verato survey offers perspectives on the data management strategies of healthcare executives, highlighting the crucial role of Healthcare Master Data Management in addressing key gaps, facilitating seamless data exchange, and aligning with the mandates of the 21st Century Cures Act.
Many organizations are skeptical about security firms' AI-powered products.
How executives adapt to rising cybersecurity concerns in mobile networksIn this Help Net Security video, Rowland Corr, VP & Head of Government Relations at Enea, discusses the implications of burner phones and the crisis of confidence in network operators as they struggle to protect consumers from sophisticated cyber threats.
Why data, AI, and regulations top the threat list for 2024The new year finds us confronted by a landscape characterized by political uncertainty, social fragmentation, escalating geopolitical tensions, and a turbulent macro-economic backdrop, making it crucial for security leaders to strategically prepare for the forthcoming challenges.
A closer look at the manufacturing threat landscapeIn this Help Net Security video, Kory Daniels, CISO at Trustwave, discusses recent comprehensive research highlighting the distinct cybersecurity threats confronting manufacturers.
New insights into the global industrial cybersecurity landscapeIn this Help Net Security video, William Noto, VP and Industry Principal for Claroty, discusses their recent global survey of 1,100 IT and OT security professionals who work in critical infrastructure sectors.
11 GenAI cybersecurity surveys you should readIn this article, you will find excerpts from generative AI surveys we covered in 2023.
These findings can help with future cybersecurity strategies.
These surveys will give your organization insight into statistics that can help create AI security strategies moving forward.
Product showcase: DCAP solution FileAuditor for data classification and access rights auditFileAuditor scans all file storages and checks them for compliance with security policies.
New infosec products of the week: December 22, 2023Here's a look at the most interesting products from the past week, featuring releases from Argus Cyber Security, Cleafy, Kasada, and Stratus.
This Cyber News was published on www.helpnetsecurity.com. Publication date: Sun, 24 Dec 2023 09:13:05 +0000