searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus

Black Hat USA 2022: Videos, news, interviews – our complete coverage is here!

Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

Lenovo

Get our top stories in your inbox

Sites using session replay scripts leak sensitive user data

November 20, 2017

When we enter sensitive information – our names, passwords, payment card information, medical information, what have you – into websites, we do it with the …

Lenovo settles FTC charges it harmed consumers with preinstalled software

September 6, 2017

Lenovo has agreed to settle charges by the Federal Trade Commission and 32 State Attorneys General that the company harmed consumers by pre-loading software on some laptops …

Lenovo tells users to uninstall vulnerable Accelerator app

June 3, 2016

In the wake of Duo Security’s report on the critical vulnerabilities sported by Original Equipment Manufacturer (OEM) updaters loaded on popular laptop and desktop …

Posts navigation

1 2 3 4

Featured news

  • Black Hat USA 2022 video walkthrough
  • Implementing zero trust for a secure hybrid working enterprise
  • SquarePhish: Advanced phishing tool combines QR codes and OAuth 2.0 device code flow
Cisco has been hacked by a ransomware gang

What's new

Which malware delivery techniques are currently favored by attackers?

Photos: Black Hat USA 2022

SquarePhish: Advanced phishing tool combines QR codes and OAuth 2.0 device code flow

Photos: Black Hat USA 2022, part 2

Don't miss

Cisco has been hacked by a ransomware gang

Which malware delivery techniques are currently favored by attackers?

Black Hat USA 2022 video walkthrough

Implementing zero trust for a secure hybrid working enterprise

SquarePhish: Advanced phishing tool combines QR codes and OAuth 2.0 device code flow

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • The challenges of managing the modern external attack surface
  • Understanding your attack surface is key to recognizing what you are defending
  • Machine learning creates a new attack surface requiring specialized defenses
  • Browser synchronization abuse: Bookmarks as a covert data exfiltration channel

(IN)SECURE Magazine ISSUE 72 (July 2022)

  • 7 threat detection challenges CISOs face and what they can do about it
  • How to set up a powerful insider threat program
  • An offensive mindset is crucial for effective cyber defense
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise