Security News

Webinar: Learn How to Stop Hackers from Exploiting Hidden Identity Weaknesses
2024-04-10 09:02

We all know passwords and firewalls are important, but what about the invisible threats lurking beneath the surface of your systems? Identity Threat Exposures (ITEs) are like secret tunnels for...

Turning the tide on third-party risk
2024-04-10 08:39

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Chrome Enterprise Premium promises extra security – for a fee
2024-04-10 06:26

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Why are many businesses turning to third-party security partners?
2024-04-10 05:00

Relying on another security organization can be daunting, which means businesses must be able to determine whether those partners are meeting their actual needs. As organizations explore third-party security solutions, it's important to ensure they ask the right questions and identify partners who can provide the knowledge, experience, and support needed to face attackers.

Microsoft Fixes 149 Flaws in Huge April Patch Release, Zero-Days Included
2024-04-10 04:57

Microsoft has released security updates for the month of April 2024 to remediate a record 149 flaws, two of which have come under active exploitation in the wild. Of the 149 flaws, three are rated...

WEF Cybercrime Atlas: Researchers are creating new insights to fight cybercrime
2024-04-10 04:30

Hosting the Cybercrime Atlas in the World Economic Forum creates the space to experiment with how we enable disruption collaborations - giving the Cybercrime Atlas participants access to the expertise and ideas of the Forums' Partnership Against Cybercrime community. This was a turning point as it answered one of the first questions posed by the Cybercrime Atlas community: can we create new and actionable intelligence relying on open-source information and, by working collectively, can we build insights that match or exceed those created by the community members working in isolation? The answer to both of these questions is a resounding "Yes".

AI risks under the auditor’s lens more than ever
2024-04-10 04:00

According to a recent Gartner survey, widespread GenAI adoption has resulted in a scramble to provide audit coverage for potential risks arising from the technology's use. In this Help Net Security video, Thomas Teravainen, a Research Specialist at Gartner, discusses how AI-related risks have seen the biggest increases in audit plan coverage in 2024.

#AI
Cybersecurity jobs available right now: April 10, 2024
2024-04-10 03:30

As an Application Security Engineer, you will work on the security engineering team and collaborate with other IT professionals to ensure that user data is protected. You will be responsible for cybersecurity monitoring and analysis of the customer infrastructures, as well as investigating any security issues or breaches.

Critical 'BatBadBut' Rust Vulnerability Exposes Windows Systems to Attacks
2024-04-10 03:05

A critical security flaw in the Rust standard library could be exploited to target Windows users and stage command injection attacks. The vulnerability, tracked as CVE-2024-24576, has a CVSS score...

GSMA releases Mobile Threat Intelligence Framework
2024-04-10 03:00

GSM Association's Fraud and Security Group has published the first version of a framework for describing, in a structured way, how adversaries attack and use mobile networks, based on the tactics, techniques and procedures that they use.The Mobile Threat Intelligence Framework is focused on mobile network-related attacks that are not already covered by existing public frameworks like MITRE ATT&CK and MITRE FiGHT. In scope are 2G, 3G, 4G, 5G, including all kind of telecommunication service enablers and future mobile technology evolutions.