Category: EN

U.S. Charged Iranian Hacker, Rewards up to $10 Million

The United States Department of Justice (DoJ) has charged an Iranian national, Alireza Shafie Nasab, for his alleged involvement in a sophisticated cyber-espionage campaign targeting American entities. The indictment, unsealed recently, reveals a multi-year operation that compromised governmental and private…

Risk and Regulation: A Strategic Guide to Compliance Risk Assessment

Compliance Risk Assessments For a Dynamic Regulatory Terrain Crafting an effective compliance program is no one-size-fits-all endeavor; it involves tailoring a comprehensive strategy that addresses your company’s unique needs and confronts specific challenges head-on. In navigating the regulatory landscape, it’s…

How-To: NIS2 EU Directive

The NIS2 Directive is a European Union legislative text on cybersecurity that supersedes the first NIS (Network and Information Security) Directive, adopted in July 2016. NIS vs. NIS2 While the first NIS (Network and Information Security) Directive increased the Member…

Phobos Ransomware Aggressively Targeting U.S. Critical Infrastructure

U.S. cybersecurity and intelligence agencies have warned of Phobos ransomware attacks targeting government and critical infrastructure entities, outlining the various tactics and techniques the threat actors have adopted to deploy the file-encrypting malware. “Structured as a ransomware as a service (RaaS) model,…

95% believe LLMs making phishing detection more challenging

More than 95% of responding IT and security professionals believe social engineering attacks have become more sophisticated in the last year, according to LastPass. Recent AI advancements, particularly generative AI, have empowered cybercriminals to coordinate social engineering assaults with unprecedented…

New compensation trends in the cybersecurity sector

For several years, cybersecurity leaders have grappled with talent shortages in crucial cyber roles. In the face of escalating financial requirements and expanding responsibilities, these leaders are under heightened pressure to achieve more with fewer resources, creating roles encompassing multiple…

Photos: BSidesZagreb 2024

BSidesZagreb is a complimentary, non-profit conference driven by community participation, designed for information security professionals and enthusiasts to gather, exchange ideas, and collaborate. Help Net Security sponsored the 2024 edition that took place on March 1, and here are photos…

Enhancing security through proactive patch management

Despite its importance, patching can be challenging for organizations due to factors such as the sheer volume of patches released by software vendors, compatibility issues with existing systems, and the need to balance security with operational continuity. To ensure effective…

Home Network Security Audits: Protecting Your Wi-Fi

Meta description: Discover how home network security audits can help protect your Wi-Fi and learn practical insights to create a safer digital environment. The post Home Network Security Audits: Protecting Your Wi-Fi appeared first on Security Zap. This article has…

IoT Device Privacy: Managing Smart Home Data

Discover the risks and strategies for managing IoT device privacy in smart homes, ensuring your personal information remains protected. The post IoT Device Privacy: Managing Smart Home Data appeared first on Security Zap. This article has been indexed from Security…