searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus

Black Hat USA 2022: Videos, news, interviews – our complete coverage is here!

Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

Tenable

Get our top stories in your inbox

NIST selects Ivanti on Implementing A Zero Trust Architecture project

July 28, 2021

Ivanti announced that it has been selected by the National Institute of Standards and Technology’s (NIST’s) National Cybersecurity Center of Excellence (NCCoE) to participate …

Illumio Core advancements help protect key assets from cyberattacks and ransomware

July 15, 2021

Illumio announced new innovations in Illumio Core which automate, accelerate, and simplify the path to a zero trust posture. Cyberattacks and ransomware are most successful …

IBM provides Kestrel, a threat hunting tool, to Open Cybersecurity Alliance

July 1, 2021

Open Cybersecurity Alliance (OCA) announced it has accepted IBM’s contribution of Kestrel, an open-source programming language for threat hunting that is used by Security …

Cisco security devices targeted with CVE-2020-3580 PoC exploit

June 29, 2021

Attackers and bug hunters are leveraging an exploit for CVE-2020-3580 to compromise vulnerable security devices running Cisco ASA or FTD software. Active attacks apparently …

June 2021 Patch Tuesday: Microsoft fixes six actively exploited zero-days

June 8, 2021

On this June 2021 Patch Tuesday: Microsoft has fixed 50 security vulnerabilities, six of which are actively exploited zero-days Adobe has delivered security updates for …

VMware fixes critical vCenter Server RCE vulnerability, urges immediate action (CVE-2021-21985)

May 26, 2021

VMware has patched two vulnerabilities (CVE-2021-21985, CVE-2021-21986) affecting VMware vCenter Server and VMware Cloud Foundation and is urging administrators to implement …

Attackers are exploiting zero-day in Pulse Secure VPNs to breach orgs (CVE-2021-22893)

April 21, 2021

Attackers have been exploiting several old and one zero-day vulnerability (CVE-2021-22893) affecting Pulse Connect Secure (PCS) VPN devices to breach a variety of defense, …

Optiv Security Enterprise IoT Lab helps identify, assess, and mitigate IoT device security challenges

April 1, 2021

Optiv Security unveiled its Enterprise Internet of Things (IoT) Lab in response to a growing and ever-present pain point for client security leaders – the proliferation of IoT …

Shujinko AuditX expands compliance automation to all major clouds and regulatory frameworks

March 25, 2021

Shujinko announced a major update to AuditX, the system of record for enterprise compliance data. This update significantly broadens the platform’s automated data collection …

March 2021 Patch Tuesday: Microsoft fixes yet another actively exploited IE zero-day

March 9, 2021

As system administrators and security teams around the world are working on ascertaining whether they’ve been breached and compromised via vulnerable Microsoft Exchange …

How do I select a cloud security solution for my business?

March 1, 2021

Attackers increasingly strive to leverage cloud weaknesses that enable them to deliver malware to end users, gain unauthorized access to production environments or their data, …

Tenable launches an all-in-one, risk-based vulnerability management platform

February 24, 2021

Tenable launched Tenable.ep, all-in-one, risk-based vulnerability management platform designed to scale as dynamic compute requirements change. Tenable.ep combines the …

Posts navigation

1 2 3 4 5 6 7 8

Featured news

  • Black Hat USA 2022 video walkthrough
  • Implementing zero trust for a secure hybrid working enterprise
  • SquarePhish: Advanced phishing tool combines QR codes and OAuth 2.0 device code flow
Cisco has been hacked by a ransomware gang

What's new

Which malware delivery techniques are currently favored by attackers?

Photos: Black Hat USA 2022

SquarePhish: Advanced phishing tool combines QR codes and OAuth 2.0 device code flow

Photos: Black Hat USA 2022, part 2

Don't miss

Cisco has been hacked by a ransomware gang

Which malware delivery techniques are currently favored by attackers?

Black Hat USA 2022 video walkthrough

Implementing zero trust for a secure hybrid working enterprise

SquarePhish: Advanced phishing tool combines QR codes and OAuth 2.0 device code flow

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • The challenges of managing the modern external attack surface
  • Understanding your attack surface is key to recognizing what you are defending
  • Machine learning creates a new attack surface requiring specialized defenses
  • Browser synchronization abuse: Bookmarks as a covert data exfiltration channel

(IN)SECURE Magazine ISSUE 72 (July 2022)

  • 7 threat detection challenges CISOs face and what they can do about it
  • How to set up a powerful insider threat program
  • An offensive mindset is crucial for effective cyber defense
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise