Security News

5 Best Password Managers for Android in 2024
2024-04-04 11:28

Explore the best password managers for Android devices that offer secure storage and easy access to your passwords. Find out which one suits your needs best.

New HTTP/2 Vulnerability Exposes Web Servers to DoS Attacks
2024-04-04 11:15

New research has unveiled a vulnerability within the HTTP/2 protocol, known as HTTP/2 CONTINUATION Flood, that allows for denial-of-service (DoS) attacks. This issue, discovered by security researcher Bartek Nowotarski and reported to CERT/CC on January 25, 2024, arises from improper handling of CONTINUATION frames—a component used to transmit extended header lists within a single stream. CERT/CC's advisory highlights that attackers exploiting this vulnerability could send continuous CONTINUATION frames without concluding them with an END_HEADERS flag, leading to potential server crashes or significant performance drops due to out-of-memory conditions or CPU exhaustion.

Surveillance by the New Microsoft Outlook App
2024-04-04 11:07

This is applications, so it is not because I've nuked state in a browser. It is applications for services for which I am paying money.

Ransomware gang did steal residents' confidential data, UK city council admits
2024-04-04 10:49

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

When AI attacks
2024-04-04 08:56

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Six steps for security and compliance in AI-enabled low-code/no-code development
2024-04-04 05:00

AI is quickly transforming how individuals create their own apps, copilots, and automations. The first is that production environments are no longer welcoming dozens or hundreds of apps but tens and hundreds of thousands of apps, automations and connections - all from users of varying technical backgrounds.

Ivanti Rushes Patches for 4 New Flaws in Connect Secure and Policy Secure
2024-04-04 04:45

Ivanti has released security updates to address four security flaws impacting Connect Secure and Policy Secure Gateways that could result in code execution and denial-of-service (DoS). The list of...

Mantis: Open-source framework that automates asset discovery, reconnaissance, scanning
2024-04-04 04:30

Mantis is an open-source command-line framework that automates asset discovery, reconnaissance, and scanning. You input a top-level domain, and it identifies associated assets, such as subdomains and certificates.

Healthcare’s cyber resilience under siege as attacks multiply
2024-04-04 04:00

What are the most common and dangerous cyber threats facing the healthcare sector in 2024? Cyber threats haven't necessarily changed, but they've become more frequent in healthcare.

Strengthening defenses against nation-state and for-profit cyber attacks
2024-04-04 03:30

There is an urgent need to secure tactical, operational, and strategic critical assets from the edge to the core. In this Help Net Security video, Geoffrey Mattson, CEO of Xage Security, discusses the steps enterprises and critical infrastructure must take to improve their environments from for-profit and nation-state attacks.