Security News

4 Ways Hackers use Social Engineering to Bypass MFA
2024-02-12 11:14

When it comes to access security, one recommendation stands out above the rest: multi-factor authentication (MFA). With passwords alone being simple work for hackers, MFA provides an essential...

CISA and OpenSSF Release Framework for Package Repository Security
2024-02-12 10:41

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced that it's partnering with the Open Source Security Foundation (OpenSSF) Securing Software Repositories Working Group to...

Why Are Compromised Identities the Nightmare to IR Speed and Efficiency?
2024-02-12 10:00

Incident response (IR) is a race against time. You engage your internal or external team because there's enough evidence that something bad is happening, but you’re still blind to the scope, the...

Mon Dieu! Nearly half the French population have data nabbed in massive breach
2024-02-12 07:27

Nearly half the citizens of France have had their data exposed in a massive security breach at two third-party healthcare payment servicers, the French data privacy watchdog disclosed last week.Payments outfits Viamedis and Almerys both experienced breaches of their systems in late January, the National Commission on Informatics and Liberty revealed, leading to the theft of data belonging to more than 33 million customers.

Integrating cybersecurity into vehicle design and manufacturing
2024-02-12 06:00

Can you describe the state of cybersecurity in the automotive industry, especially in the context of electric and connected vehicles? What steps are automakers taking to address cybersecurity challenges in their latest vehicle models?

Microsoft Introduces Linux-Like 'sudo' Command to Windows 11
2024-02-12 05:45

Microsoft said it's introducing Sudo for Windows 11 as part of an early preview version to help users execute commands with administrator privileges. "Sudo for Windows is a new way for users to...

Hacking the flow: The consequences of compromised water systems
2024-02-12 05:30

In this Help Net Security video, Andy Thompson, Offensive Cybersecurity Research Evangelist at CyberArk, discusses the dire consequences of hacking water systems and why their cybersecurity must be prioritized. From contaminating water supplies to disrupting essential services, the impact of such attacks can present a direct danger to public health and safety.

Ransomware tactics evolve, become scrappier
2024-02-12 05:00

As we enter 2024, ransomware remains the most significant cyberthreat facing businesses, according to Malwarebytes. Alongside the rise of ransomware attacks in 2023, the average ransom demand also climbed significantly.

U.S. Offers $10 Million Bounty for Info Leading to Arrest of Hive Ransomware Leaders
2024-02-12 04:31

The U.S. Department of State has announced monetary rewards of up to $10 million for information about individuals holding key positions within the Hive ransomware operation. It is also giving...

SiCat: Open-source exploit finder
2024-02-12 04:30

SiCat is an open-source tool for exploit research designed to source and compile information about exploits from open channels and internal databases. Performing exploit searches based on desired inputs and sources such as Exploit-DB, Exploit Alert, Packetstorm Security, NVD Database, and Metasploit modules.