Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
week in review
Week in review: Macro-less Office documents zero-day bug, FluBot takedown, growing DDoS threats

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Zero-day bug exploited by attackers via macro-less Office documents …

Microsoft
Attackers are leveraging Follina. What can you do?

As the world is waiting for Microsoft to push out a patch for CVE-2022-30190, aka “Follina”, attackers around the world are exploiting the vulnerability in a …

atlassian confluence
Unpatched Atlassian Confluence zero-day exploited, fix expected today (CVE-2022-26134)

A critical zero-day vulnerability (CVE-2022-26134) in Atlassian Confluence Data Center and Server is under active exploitation, the software maker has warned on Thursday. …

New infosec products of the week: June 3, 2022

Here’s a look at the most interesting products from the past week, featuring releases from ESET, Kingston Digital, SecureAuth, SecurityMetrics, Semperis, and Traceable AI. …

gears
40% of enterprises don’t include business-critical systems in their cybersecurity monitoring

Logpoint has announced findings from a recent poll to uncover the security and cost implications enterprises face with their existing IT infrastructure. The poll was targeted …

chess
Intelligence is key to strategic business decisions

Businesses have a growing need for greater relevance in the intelligence they use to inform critical decision-making. Currently just 18% of professionals responsible for …

Microsoft Office
Microsoft Office apps are vulnerable to IDN homograph attacks

Microsoft Office apps – including Outlook – are vulnerable to homograph attacks based on internationalized domain names (IDNs). In practice, this means that users …

brain
Concentric’s AI technologies simplify and automate data security

Visit Concentric AI at RSA Conference 2022 – Early Stage Expo in the South Hall on the second level, booth 18. You’ll be able to see their product in action and …

woman
How to support women in cybersecurity

Cybersecurity is required to be a dynamic industry because cybercriminals don’t take days off. Cybersecurity professionals must be innovative, creative, and attentive to keep …

Hand
Massive shadow code risk for world’s largest businesses

Source Defense announced the results of a study that for the first time sizes the security, privacy, and compliance risks that are literally designed into the digital supply …

BEC scams
Language-based BEC attacks rising

Armorblox released a report which highlights the use of language-based attacks that bypass existing email security controls. The report uncovers how the continued increase in …

Car
Autonomous vehicles can be tricked into erratic driving behavior

When a driverless car is in motion, one faulty decision by its collision-avoidance system can lead to disaster, but researchers at the University of California, Irvine have …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools