Category: Help Net Security

Apple fixes exploited iOS, iPadOS zero-day (CVE-2022-42827)

For the ninth time this year, Apple has released fixes for a zero-day vulnerability (CVE-2022-42827) exploited by attackers to compromise iPhones. About CVE-2022-42827 CVE-2022-42827 is an out-of-bounds write issue in the iOS and iPadOS kernel, which can be exploited to…

Key observations on DDoS attacks in H1 2022

In the first half of 2022, the amount of DDoS attacks increased by 75.6% compared to the second half of 2021, according to new Nexusguard research revealed in the company’s DDoS Statistical Report for 1HY 2022. In this Help Net…

The long-term psychological effects of ransomware attacks

Northwave has conducted scientific research into the psychological effects of a ransomware crisis on both organizations and individuals. The findings reveal the deep marks that a ransomware crisis leaves on all those affected. It also shows how their IT and…

GoCardless Protect+ enables merchants to identify fraudulent activity

GoCardless launched Protect+, an end-to-end fraud prevention solution that detects fraudulent activity and protects merchants from potential losses through enhanced payer verification, 24/7 fraud monitoring and chargeback challenges. With Protect+, merchants will be able to improve their overall percentage of…

CYE appoints Ira Winkler as Field CISO

CYE announced its appointment of Ira Winkler as Field CISO, alongside the expansion of its rapidly growing sales team. Ira joins CYE to bolster its operations in the US as the company continues to expand during a period of hyper…

Asset risk management: Getting the basics right

In this interview with Help Net Security, Yossi Appleboum, CEO at Sepio, talks about asset risk management challenges for different industries and where it’s heading. Cyberattacks show no signs of slowing down. What do organizations need to do to boost…

Social engineering attacks anybody could fall victim to

Social engineering – also known as human hacking – is an expression that encompasses a number of methods and vectors attackers use to manipulate targets into giving away or providing access to sensitive information, or generally performing actions that are…

Consumer behaviors are the root of open source risk

Sonatype unveiled its eighth annual State of the Software Supply Chain Report which, in addition to a massive surge in open source supply, demand, and malicious attacks, found that 96% of open source Java downloads with known-vulnerabilities could have been…

New infosec products of the week: October 21, 2022

Here’s a look at the most interesting products from the past week, featuring releases from AwareGO, Code42, Corelight, EnigmaSoft, Exabeam, Mandiant, and RSA. Code42 enhances Incydr Risk Indicators to help users protect and classify sensitive data Code42 has enhanced its…

New infosec products of the week: October 21, 2022

Here’s a look at the most interesting products from the past week, featuring releases from AwareGO, Code42, Corelight, EnigmaSoft, Exabeam, Mandiant, and RSA. Code42 enhances Incydr Risk Indicators to help users protect and classify sensitive data Code42 has enhanced its…

The companies most likely to lose your data

Web companies are most likely to lose your data, a study shows. The study, conducted by VPN Overview, analysed major data breaches that have been registered since 2004 to discover which industry is most prone to losing data. Online companies…

How supply chain threats will evolve in 2023

Software supply chain risk has grown to be a significant concern for organizations as cyber attackers look to take advantage of the accelerating digitalization that has seen many enterprises significantly increase their reliance on cloud-based solutions and services, as well…

SolarWinds Observability provides visibility in both public and private clouds

SolarWinds has launched SolarWinds Observability, a fully-integrated, cloud-native SaaS offering that provides unified and comprehensive visibility for distributed, hybrid, and multi-cloud IT environments. SolarWinds Observability enables customers to accelerate digital transformation through powerful machine learning (ML) and artificial intelligence (AI)…

Sheila Carpenter joins Everbridge as CIO

Everbridge has appointed Sheila Carpenter as Chief Information Officer (CIO), responsible for leading the company’s global information technology (IT) efforts, including corporate IT infrastructure, technology systems, and enterprise architecture. Sheila reports to Chief Executive Officer Dave Wagner, and will oversee…

Why chasing risk assessments will have you chasing your tail

Third-party risk assessments are often described as time-consuming, repetitive, overwhelming, and outdated. Think about it: organizations, on average, have over 5,000 third parties, meaning they may feel the need to conduct over 5,000 risk assessments. In the old school method,…

Ransomware preparedness: What are you doing wrong?

Axio released its 2022 State of Ransomware Preparedness research report, revealing that although notable improvements have been made since Axio’s 2021 report, organizational ransomware preparedness continues to be insufficient to keep pace with new attack vectors. The report reveals that…

The most dangerous connected devices

The growing number and diversity of connected devices in every industry present new challenges for organizations to understand and manage the risks they are exposed to. In this Help Net Security video, Daniel Dos Santos, Head of Security Research at…