Security News > 2024 > May

Visualize your critical cyber risks
2024-05-14 09:39

How to empower CISOs and mitigate cyber security risks in a rapidly evolving threat landscape Sponsored Post Defending against the cyber threats of today isn't dissimilar to protecting a medieval...

NHS Digital hints at exploit sightings of Arcserve UDP vulnerabilities
2024-05-14 09:29

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Google Chrome emergency update fixes 6th zero-day exploited in 2024
2024-05-14 08:10

Google has released emergency security updates for the Chrome browser to address a high-severity zero-day vulnerability tagged as exploited in attacks. Chrome updates automatically when a security update is available, but users can confirm they're running the latest version by going to Settings > About Chrome, letting the update finish, and then clicking on the 'Relaunch' button to apply it.

Apple and Google Launch Cross-Platform Feature to Detect Unwanted Bluetooth Tracking Devices
2024-05-14 05:16

Apple and Google on Monday officially announced the rollout of a new feature that notifies users across both iOS and Android if a Bluetooth tracking device is being used to stealthily keep tabs on...

How a GRC consultant passed the CISSP exam in six weeks
2024-05-14 04:55

It's rumored the CISSP examp pass rate is about 20%. I scheduled my exam for the spring of 2024, and I have set aside precisely six weeks to prepare for it. Even if you're an expert on Asset Security, this ensures you're comprehensive and close knowledge gaps because very few individuals are experts in all the domains covered by the CISSP exam.

BLint: Open-source tool to check the security properties of your executables
2024-05-14 04:30

BLint is a Binary Linter designed to evaluate your executables' security properties and capabilities, utilizing LIEF for its operations. From version 2, BLint can also produce Software Bill-of-Materials for compatible binaries.

Tailoring responsible AI: Defining ethical guidelines for industry-specific use
2024-05-14 04:00

In this Help Net Security interview, Chris Peake, CISO & SVP at Smartsheet, explains how responsible AI should be defined by each organization to guide their AI development and usage. Peake emphasizes that implementing responsible AI requires balancing ethical considerations, industry regulations, and proactive risk assessment to ensure that AI is used transparently.

Are you meeting your cyber insurance requirements?
2024-05-14 03:30

Cyber insurance policies are specifically designed to offer financial protection to organizations in the face of cyber attacks, data breaches, or other cybersecurity incidents. While they can provide a sense of security, it's crucial to be aware of their limitations.

Log4Shell shows no sign of fading, spotted in 30% of CVE exploits
2024-05-14 03:00

Organizations continue to run insecure protocols across their wide access networks, making it easier for cybercriminals to move across networks, according to a Cato Networks survey. The Cato CTRL SASE Threat Report Q1 2024 provides insight into the security threats and their identifying network characteristics for all aggregate traffic-regardless of whether they emanate from or are destined for the internet or the WAN-and for all endpoints across sites, remote users, and cloud resources.

PyPi package backdoors Macs using the Sliver pen-testing suite
2024-05-13 21:50

A new package mimicked the popular 'requests' library on the Python Package Index to target macOS devices with the Sliver C2 adversary framework, used for gaining initial access to corporate networks. Discovered by Phylum, the campaign involves several steps and obfuscation layers, including using steganography in a PNG image file to covertly install the Sliver payload on the target.