![backdoor](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194522/backdoor-400x200.jpg)
Telecom firms hit with novel backdoors disguised as security software
Researchers have unearthed new backdoors leveraged to maintain long-term access in the networks of telecom firms in the Middle East. HTTPSnoop and PipeSnoop – as the two …
![WinRAR](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/23165609/winrar-2-400x200.jpg)
Fake WinRAR PoC spread VenomRAT malware
An unknown threat actor has released a fake proof of concept (PoC) exploit for CVE-2023-4047, a recently fixed remote code execution (RCE) vulnerability in WinRAR, to spread …
![Darren Sankbeil](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/12135753/darren_sankbeil-2-dragos-400x200.jpg)
Industrial cybersecurity giant Dragos rakes in new funding, sets sights on global expansion
Today, Dragos revealed that it has secured a $74 million Series D extension funding round, spearheaded by the strategic operating and investment firm WestCap. The funding …
![Mac malware](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095315/mac-malware-400x200.jpg)
MetaStealer malware is targeting enterprise macOS users
Enterprise macOS users are being targeted by attackers slinging new information-stealing malware dubbed MetaStealer. The MetaStealer malware MetaStealer is delivered within …
![chain](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/13152653/chain1-400x200.jpg)
The rise and evolution of supply chain attacks
A supply chain attack is a cyberattack that focuses on a third-party supplier providing essential services or software to the supply chain. In this Help Net Security video, …
![Facebook](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102441/facebook-400x200.jpg)
Requests via Facebook Messenger lead to hijacked business accounts
Hijackers of Facebook business accounts are relying on fake business inquiries and threats of page/account suspension to trick targets into downloading password-stealing …
![Microsoft Teams](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/10152152/ms-teams3-400x200.jpg)
Microsoft Teams users targeted in phishing attack delivering DarkGate malware
A new phishing campaign taking advantage of an easily exploitable issue in Microsoft Teams to deliver malware has been flagged by researchers. Delivering malware to Microsoft …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/19153210/email-400x200.jpg)
Email forwarding flaws enable attackers to impersonate high-profile domains
Sending an email with a forged address is easier than previously thought, due to flaws in the process that allows email forwarding, according to a research team led by …
![backup](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/02103956/back-up-data-400x200.jpg)
Best practices for implementing a proper backup strategy
Implementing a robust backup strategy for safeguarding crucial business data is more essential than ever. Without such a plan, organizations risk paying ransoms and incurring …
![Mac malware](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095317/mac-malware2-400x200.jpg)
MacOS malware has a new trick up its sleeve
A newer version of the Atomic Stealer macOS malware has a new trick that allows it to bypass the operating system’s Gatekeeper, Malwarebytes researchers have discovered. …
![vulnerabilities](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/06155040/vulnerabilities-400x200.jpg)
Old vulnerabilities are still a big problem
A recently flagged phishing campaign aimed at delivering the Agent Tesla RAT to unsuspecting users takes advantage of old vulnerabilities in Microsoft Office that allow remote …
![connected car](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/01095643/connected_car-400x200.jpg)
Connected cars and cybercrime: A primer
Original equipment suppliers (OEMs) and their suppliers who are weighing how to invest their budgets might be inclined to slow pedal investment in addressing cyberthreats. To …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege