Help Net Security
Nessus in the cloud
The Nessus vulnerability scanner features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of an …
Win a copy of Ninja Hacking!
We are giving away two copies of “Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques“. Throw traditional pen testing methods out the window …
WordPress Comment Rating plugin CSRF vulnerability
A vulnerability has been reported in the Comment Rating plugin for WordPress, which can be exploited by malicious people to conduct cross-site request forgery attacks, …
QuickTime 7.6.9 fixes security issues
Here is the security content related to QuickTime 7.6.9, available for download here. A local user may have access to sensitive information A filesystem permission issue …
Zeus targets major retailers
Trusteer recently discovered a Zeus botnet that is targeting credit card accounts of major retailers including Macy’s and Nordstrom just as the holiday gift buying …
Increased collaboration on cybercrime syndicate crackdowns
As 2010 comes to a close, information security companies are trying to predict the amount of problems we’ll have to deal with next year. Below is a list of 5 security …
Avoid the phishing net
Phishing, the process of attempting to acquire sensitive information by masquerading as a legitimate and trustworthy company via online means, used to just be a problem for …
CORE IMPACT Pro 11 now detects and exploits network router vulnerabilities
Core Security Technologies introduced the latest version of its automated penetration testing solution, CORE IMPACT Pro 11. CORE IMPACT Pro enables users to conduct real-world …
Growing mobile workforce will increase security complexity
IT security administrators anticipate a significant increase in the number of users connecting to their network in the next year, with 54% citing specific growth in the number …
Vulnerability scanning added to GFI MAX RemoteManagement
GFI Software added vulnerability scanning and security patch management to GFI MAX RemoteManagement, an IT managed services software solution that makes it easy to stay on top …
Cisco estimates huge shift to the cloud by 2013
Nearly 12 percent of enterprise workloads will run in the public cloud by the end of 2013, according to Cisco. Their study found that desktop applications, email, …
What’s in store for 2011? More scams and identity theft
Unemployment, economic uncertainty and the proliferation of technology will be factors in emerging types of fraud over the next year, according to the 2011 Identity Theft …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)