Please turn on your JavaScript for this page to function normally.
Cynet platform
Gain immediate visibility into your actual cyber risk for free

Visibility into an environment attack surface is the fundamental cornerstone to sound security decision making. However, the standard process of 3rd party threat assessment as …

Apache
PoC exploit for Carpe Diem Apache bug released

Charles Fol, the security engineer that unearthed the Carpe Diem Apache HTTP Server bug (CVE-2019-0211), has released an exploit for it. “This is between a POC and a …

building
Is your organization getting physical security right?

For most organizations (and especially for tech companies), the physical security of data centers and headquarters is of the utmost importance. As Tim Roberts, a senior …

Woman working on laptop
Adhering to the mobility requirements of NIST 800-171 does not have to keep you awake at night

The majority of companies in the United States and Europe are required to comply with at least one IT security regulation – often times more. This forces companies to exert …

Framing supply chain attacks

The increase in the demand for innovative software has effectively reshaped the software development industry itself. Today, speed and agility are paramount and development …

industrial
90% of OT organizations are cyberattack victims, yet visibility into OT systems is still limited

90% of OT organizations stated their environments had been damaged by at least one cyberattack over the past two years, with 62% experiencing two or more attacks. These are …

FileTSAR
FileTSAR: Free digital forensic investigations toolkit for law enforcement

Purdue University cybersecurity experts have created FileTSAR, an all-in-one digital forensic investigations toolkit for law enforcement. About FileTSAR FileTSAR, which stands …

Magento
Magento sites under attack through easily exploitable SQLi flaw

A recently patched SQL injection flaw affecting the popular open-source e-commerce platform Magento is being actively exploited by attackers, so if you haven’t …

wire
Perimeter solutions: Do layers of security make a difference?

As an enterprise, it is always important to constantly reevaluate information security solutions. When doing so, take a good look at the perimeter solutions in place and their …

analyst
CIOs and CISOs hold off on crucial updates due to potential impact on business operations

CIOs and CISOs around the world have held back from implementing critical measures that keep them resilient against disruption and cyber threats. Over eight out of ten (81%) …

iovation MFA
Securing your app and driving down call center fraud

In this Help Net Security podcast, Angie White, Product Marketing Manager at iovation, talks about how optimizing the customer journey through your mobile app can help you …

bulb
Insights gained from working on more than 750 cybersecurity incidents

Many entities face the same security risks so it is essential to have an insight on how to manage them and respond in case of occurrence. BakerHostetler’s privacy and data …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools