searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

DEF CON

Get our top stories in your inbox

ProxyShell vulnerabilities actively exploited to deliver web shells and ransomware

August 23, 2021

Three so-called “ProxyShell” vulnerabilities are being actively exploited by various attackers to compromise Microsoft Exchange servers around the world, the …

Vulnerabilities in Dell computers allow RCE at the BIOS/UEFI level

June 24, 2021

An estimated 30 million Dell computers are affected by several vulnerabilities that may enable an attacker to remotely execute code in the pre-boot (BIOS/UEFI) environment, …

Review: Kill Chain: The Cyber War on America’s Elections

May 19, 2020

Kill Chain is an HBO documentary made and produced by Simon Arizzone, Russell Michaels and Sarah Teale. Kill Chain: Inside the documentary Arizzone and Michaels already worked …

Nmap 7.80 released: A mature Npcap Windows packet capturing driver, 11 new NSE scripts

August 12, 2019

Nmap is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network …

Qualys bringing new prescription for security to Black Hat and DEF CON 2019

August 7, 2019

At this year’s Black Hat, Qualys is bringing a new prescription for security — the company is providing its Global IT Asset Discovery and Inventory application to businesses …

Hack The Sea: Bridging the gap between hackers and the maritime sector

June 4, 2019

There’s a not a lot of researchers probing the security of computer systems underpinning the maritime industry. The limitations that keep that number low are obvious: …

Hacking healthcare: A call for infosec researchers to probe biomedical devices

April 10, 2019

It is a brave new connected world out there and there is no shortage of cybersecurity risks associated with everything we do. We can’t even be sure that the technologies …

Hack the Marine Corps bug bounty program kicks off

August 14, 2018

The U.S. Department of Defense (DoD) and HackerOne launched the Department’s sixth bug bounty program, Hack the Marine Corps. The bug bounty challenge will focus on Marine …

Vulnerabilities in smart card drivers open systems to attackers

August 13, 2018

Security researcher Eric Sesterhenn of X41 D-SEC GmbH has unearthed a number of vulnerabilities in several smart card drivers, some of which can allow attackers to log into …

Criminals can compromise company networks by sending malicious faxes

August 13, 2018

Check Point has revealed details about the two critical remote code execution vulnerabilities (CVE-2018-5924, CVE-2018-5925) it discovered in the communication protocols used …

Kryptowire introduces the mobile phone firmware vulnerability feed

August 10, 2018

Kryptowire discovered vulnerabilities in mobile device firmware and pre-installed mobile apps that pose a risk for the mobile phone supply chain because they can expose …

Infosec and the future: Dr. Giovanni Vigna on lessons learned over 25 years

July 12, 2018

When I asked Dr. Giovanni Vigna what are some of the most important lessons he has learned during the 25+ years he spent working in computer security, his answer was simple: …

Posts navigation

1 2

Featured news

  • BLE vulnerability may be exploited to unlock cars, smart locks, building doors, smartphones
  • Kali Linux 2022.2 released: Desktop enhancements, tweaks for the terminal, new tools, and more!
  • Mastering microsegmentation for enterprise applications
Download guide: Evaluating third-party security platforms

What's new

BLE vulnerability may be exploited to unlock cars, smart locks, building doors, smartphones

Kali Linux 2022.2 released: Desktop enhancements, tweaks for the terminal, new tools, and more!

Mastering microsegmentation for enterprise applications

Cardiologist charged for use and sale of ransomware

Don't miss

BLE vulnerability may be exploited to unlock cars, smart locks, building doors, smartphones

Kali Linux 2022.2 released: Desktop enhancements, tweaks for the terminal, new tools, and more!

Cardiologist charged for use and sale of ransomware

Mastering microsegmentation for enterprise applications

Why cyber security can’t just say “no“

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • Data centers on steel wheels: Can we trust the safety of the railway infrastructure?
  • Good end user passwords begin with a well-enforced password policy
  • Keep your digital banking safe: Tips for consumers and banks
  • Is cybersecurity talent shortage a myth?

(IN)SECURE Magazine ISSUE 71 (March 2022)

  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise