Skip to content

Security News

Lastest stories from HelpNetSecurity

  • by Help Net Security
    Here’s a look at the most interesting products from the past week, featuring releases from Perimeter 81, SpyCloud, ThreatConnect, Venafi, and Wallarm. SpyCloud Compass identifies infected devices accessing critical workforce apps SpyCloud Compass enables organizations to reduce their risk of ransomware by identifying hard-to-detect malware infections that provide bad actors with entry points. It also […]
  • by Help Net Security
    80% of organizations increased their use of open source software over the last 12 months, according to Perforce Software and the Open Source Initiative. Four out of five companies rely on OSS for a wide range of business-critical applications including data and database management, containers and container orchestration, and DevOps and SDLC tooling. The report […]
  • by Help Net Security
    Enterprises are going all-in on cloud storage, with average stored capacity in the public cloud expected to reach 43% of their total storage footprint by 2024, and the vast majority (84%) are increasing their budgets to make that a reality, according to Wasabi. The survey seeks to uncover the changing attitudes toward public cloud storage […]
  • by Help Net Security
    Europol supported the German, Dutch and US authorities in taking down the infrastructure of the prolific HIVE ransomware. This international operation involved authorities from 13 countries in total. Law enforcement identified the decryption keys and shared them with many victims, helping them regain access to their data without paying the cybercriminals. In the last year, […]
  • by Zeljka Zorz
    Akamai researchers have published a PoC exploit for a critical vulnerability (CVE-2022-34689) in Windows CryptoAPI, which validates public key certificates. “An attacker could manipulate an existing public x.509 certificate to spoof their identity and perform actions such as authentication or code signing as the targeted certificate,” Microsoft said in October 2022, when they announced fixes […]
  • by Zeljka Zorz
    Tricking users at targeted organizations into installing legitimate remote monitoring and management (RMM) software has become a familiar pattern employed by financially motivated attackers. No organization is spared, not even agencies of the US federal civilian executive branch – as the Cybersecurity and Infrastructure Security Agency (CISA) warned on Wednesday. Attackers’ modus operandi “In October […]
disability confident committed

Contact Us

Proprius Recruitment Ltd


Tel: 020 3355 8648