searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

exploit

Get our top stories in your inbox

CVE-2021-40444 exploitation: Researchers find connections to previous attacks

September 16, 2021

The recent targeted attacks exploiting the (at the time) zero-day remote code execution vulnerability (CVE-2021-40444) in Windows via booby-trapped Office documents have been …

Microsoft patches actively exploited MSHTML zero-day RCE (CVE-2021-40444)

September 14, 2021

On September 2021 Patch Tuesday, Microsoft has fixed 66 CVE-numbered vulnerabilities in a wide variety of its solutions. Of these, the most crucial to address is …

Apple fixes “zero-click” iMessage zero-day exploited to deliver spyware (CVE-2021-30860)

September 14, 2021

Apple has released security updates for macOS, iOS, iPadOS, watchOS and Safari that patch two vulnerabilities (CVE-2021-30860, CVE-2021-30858) that are being exploited in …

Patched: Critical bug with public PoC exploit in Cisco infrastructure virtualization software (CVE-2021-34746)

September 3, 2021

A critical vulnerability (CVE-2021-34746) that affects Cisco Enterprise NFV Infrastructure Software (NFVIS) has been patched and Cisco is urging enterprise admins to quickly …

Realtek SDK vulnerability exploitation attempts detected (CVE-2021-35395)

August 24, 2021

Threat actors are attempting to exploit CVE-2021-35395, a group of vulnerabilities in the web interface of the Realtek SDK, to spread Mirai malware to vulnerable IoT devices. …

ProxyShell vulnerabilities actively exploited to deliver web shells and ransomware

August 23, 2021

Three so-called “ProxyShell” vulnerabilities are being actively exploited by various attackers to compromise Microsoft Exchange servers around the world, the …

The value of PII and how it still fuels malign activities in the digital ecosystem

August 10, 2021

The COVID-19 pandemic engendered new vulnerabilities in the digital ecosystem for threat actors to exploit, resulting in items like vaccines, fraudulent vaccine certificates, …

Ransom demands reaching $1.2M, smaller companies increasingly targeted

August 3, 2021

Ransom demands have grown substantially over the past year, smaller companies are increasingly targeted, and cyber criminals continue to take advantage of dislocations in how …

There are new unpatched bugs in Windows Print Spooler

July 19, 2021

Security researchers have unearthed new elevation of privilege (EoP) bugs in Windows Print Spooler, one of the oldest Windows components. Scarce details have been shared about …

Explosion of 0-day exploits: The bad news and the good news

July 15, 2021

Have you noticed that lately we’ve been hearing more about in-the-wild attacks exploiting 0-day vulnerabilities? “Halfway into 2021, there have been 33 0-day …

22% of exploits for sale in underground forums are more than three years old

July 15, 2021

Trend Micro released a research urging organizations to focus patching efforts on the vulnerabilities that pose the greatest risk to their organization, even if they are years …

Cybercriminals customizing malware for attacks on virtual infrastructure

July 15, 2021

Cyber incidents continue to rise, ransomware accounts for nearly two-thirds of all malware attacks, and more cybercriminals are customizing malware for attacks on virtual …

Posts navigation

1 2 3 4 5 6 7 … 44

Featured news

  • Kali Linux 2022.2 released: Desktop enhancements, tweaks for the terminal, new tools, and more!
  • Mastering microsegmentation for enterprise applications
  • The most insecure and easily hackable passwords
Download guide: Evaluating third-party security platforms

What's new

Kali Linux 2022.2 released: Desktop enhancements, tweaks for the terminal, new tools, and more!

Mastering microsegmentation for enterprise applications

Cardiologist charged for use and sale of ransomware

Why cyber security can’t just say “no“

Don't miss

Kali Linux 2022.2 released: Desktop enhancements, tweaks for the terminal, new tools, and more!

Cardiologist charged for use and sale of ransomware

Mastering microsegmentation for enterprise applications

Why cyber security can’t just say “no“

The most insecure and easily hackable passwords

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • Data centers on steel wheels: Can we trust the safety of the railway infrastructure?
  • Good end user passwords begin with a well-enforced password policy
  • Keep your digital banking safe: Tips for consumers and banks
  • Is cybersecurity talent shortage a myth?

(IN)SECURE Magazine ISSUE 71 (March 2022)

  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise