Help Net Security
Metasploit Framework 3.3.2 released
The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration …
Securing the foundation of IT systems
Recent studies show that securing the operating system is recognized as a necessary practice in an organization’s overall security policy, but it is not being done on a …
SQL injection attack claims 132,000+
A large scale SQL injection attack has injected a malicious iframe on tens of thousands of susceptible websites. ScanSafe reports that the injected iframe loads malicious …
Snort Alert Monitor 0.6.0 released
Snort Alert Monitor works in conjunction with Snort and provides much better reporting and real-time statistics that aren’t available with Snort alone. New in Snort …
The security nightmare formula
According to the Cisco 2009 Annual Security Report, small errors on the part of computer users or their IT departments may not wreak havoc on their own, but in combination, …
iptables 1.4.6 released
iptables is the userspace command line program used to configure the Linux 2.4.x and 2.6.x IPv4 packet filtering ruleset. It is targeted towards system administrators. …
E-card malware scam
Red Condor issued a warning about a new e-Card spam campaign that appears to come from American Greetings’ BlueMountain.com. The email, with the subject line “You …
Threats and threat technologies in 2010
Trend Micro released a report titled “The Future of Threats and Threat Technologies”, in which they analyzed the current situation and made some predictions for …
Global IT-related risk framework
ISACA released Risk IT, the first global IT-related risk framework to provide a comprehensive view of the business risks associated with IT initiatives. Available as a free …
Top 15 most common security attacks
The latest in the Data Breach Investigations Report series by Verizon Business security experts provide a look at the 15 most common security attacks and how they typically …
Advances in surveillance, more attacks on the horizon
Slashed budgets and reduced staffing numbers delayed many security initiatives in 2009, but the vulnerabilities didn’t retreat and will only intensify in 2010, Unisys …
Microsoft releases six security bulletins
In today’s Patch Tuesday, Microsoft delivers 6 bulletins that fix vulnerabilities targeting Windows, Office and Internet Explorer. Jason Miller, Data and Security Team …
Featured news
Resources
Don't miss
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform
- Connected homes: Is bystander privacy anyone’s responsibility?
- Google says 2026 will be the year AI supercharges cybercrime