<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Help Net Security</title>
	<atom:link href="https://www.helpnetsecurity.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.helpnetsecurity.com/</link>
	<description>Daily information security news with a focus on enterprise security.</description>
	<lastBuildDate>Mon, 28 Aug 2023 11:34:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.2.2</generator>

<image>
	<url>https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093400/cropped-hns2-32x32.png</url>
	<title>Help Net Security</title>
	<link>https://www.helpnetsecurity.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Kroll SIM-swap attack: FTX, BlockFi and Genesis clients&#8217; info exposed</title>
		<link>https://www.helpnetsecurity.com/2023/08/28/kroll-sim-swapping-attack/</link>
		
		<dc:creator><![CDATA[Helga Labus]]></dc:creator>
		<pubDate>Mon, 28 Aug 2023 11:34:18 +0000</pubDate>
				<category><![CDATA[Don't miss]]></category>
		<category><![CDATA[Hot stuff]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Kroll]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[T-Mobile]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=274192</guid>

					<description><![CDATA[<p>Financial and risk advisory firm Kroll has suffered a SIM-swapping attack that allowed a threat actor to access files containing personal information of clients of bankrupt cryptocurrency platforms FTX, BlockFi and Genesis. The Kroll SIM-swapping attack On Saturday, August 19, 2023, an attacker targeted a Kroll employee&#8217;s T-Mobile US account &#8220;in a highly sophisticated SIM swapping attack&#8221;. &#8220;Specifically, T-Mobile, without any authority from or contact with Kroll or its employee, transferred that employee’s phone number &#8230; <a href="https://www.helpnetsecurity.com/2023/08/28/kroll-sim-swapping-attack/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a rel="nofollow" href="https://www.helpnetsecurity.com/2023/08/28/kroll-sim-swapping-attack/">Kroll SIM-swap attack: FTX, BlockFi and Genesis clients&#8217; info exposed</a> appeared first on <a rel="nofollow" href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>PoC for no-auth RCE on Juniper firewalls released</title>
		<link>https://www.helpnetsecurity.com/2023/08/28/poc-rce-juniper-firewalls/</link>
		
		<dc:creator><![CDATA[Zeljka Zorz]]></dc:creator>
		<pubDate>Mon, 28 Aug 2023 10:20:06 +0000</pubDate>
				<category><![CDATA[Don't miss]]></category>
		<category><![CDATA[Hot stuff]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Juniper Networks]]></category>
		<category><![CDATA[Junos OS]]></category>
		<category><![CDATA[PoC]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[WatchTowr]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=274204</guid>

					<description><![CDATA[<p>Researchers have released additional details about the recently patched four vulnerabilities affecting Juniper Networks&#8217; SRX firewalls and EX switches that could allow remote code execution (RCE), as well as a proof-of-concept (PoC) exploit. Junos OS vulnerabilities and fixes Earlier this month, Juniper Networks published an out-of-cycle security bulletin notifying customers using its SRX firewalls and EX switches of vulnerabilities that, chained together, would allow attackers to remotely execute code on vulnerable appliances. The four vulnerabilities &#8230; <a href="https://www.helpnetsecurity.com/2023/08/28/poc-rce-juniper-firewalls/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a rel="nofollow" href="https://www.helpnetsecurity.com/2023/08/28/poc-rce-juniper-firewalls/">PoC for no-auth RCE on Juniper firewalls released</a> appeared first on <a rel="nofollow" href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Uncovering a privacy-preserving approach to machine learning</title>
		<link>https://www.helpnetsecurity.com/2023/08/28/machine-learning-ml-models/</link>
		
		<dc:creator><![CDATA[Help Net Security]]></dc:creator>
		<pubDate>Mon, 28 Aug 2023 05:00:29 +0000</pubDate>
				<category><![CDATA[Don't miss]]></category>
		<category><![CDATA[Expert analysis]]></category>
		<category><![CDATA[Expert corner]]></category>
		<category><![CDATA[Hot stuff]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Enveil]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[opinion]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[regulation]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=274106</guid>

					<description><![CDATA[<p>In the era of data-driven decision making, businesses are harnessing the power of machine learning (ML) to unlock valuable insights, gain operational efficiencies, and solidify competitive advantage. Although recent developments in generative artificial intelligence (AI) have raised unprecedented awareness around the power of AI/ML, they have also illuminated the foundational need for privacy and security. Groups like IAPP, Brookings, and Gartner’s recent AI TRiSM framework have outlined key considerations for organizations looking to achieve the &#8230; <a href="https://www.helpnetsecurity.com/2023/08/28/machine-learning-ml-models/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a rel="nofollow" href="https://www.helpnetsecurity.com/2023/08/28/machine-learning-ml-models/">Uncovering a privacy-preserving approach to machine learning</a> appeared first on <a rel="nofollow" href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Adapting authentication to a cloud-centric landscape</title>
		<link>https://www.helpnetsecurity.com/2023/08/28/florian-forster-zitadel-ineffective-authorization/</link>
		
		<dc:creator><![CDATA[Mirko Zorz]]></dc:creator>
		<pubDate>Mon, 28 Aug 2023 04:30:22 +0000</pubDate>
				<category><![CDATA[Don't miss]]></category>
		<category><![CDATA[Features]]></category>
		<category><![CDATA[Hot stuff]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[access control]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[biometrics]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[credentials]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[opinion]]></category>
		<category><![CDATA[passwordless]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[regulation]]></category>
		<category><![CDATA[SSO]]></category>
		<category><![CDATA[zero trust]]></category>
		<category><![CDATA[ZITADEL]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=274015</guid>

					<description><![CDATA[<p>In this Help Net Security interview, Florian Forster, CEO at Zitadel, discusses the challenges CISOs face in managing authentication across increasingly distributed and remote workforces, the negative consequences of ineffective authorization, and how the shift toward cloud transformation affects authentication strategies. What are some real-world consequences of ineffective authorization, and how can they be prevented? Ineffective authorization can have multiple negative consequences, some of them include: Data breaches: When unauthorized individuals have access to sensitive &#8230; <a href="https://www.helpnetsecurity.com/2023/08/28/florian-forster-zitadel-ineffective-authorization/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a rel="nofollow" href="https://www.helpnetsecurity.com/2023/08/28/florian-forster-zitadel-ineffective-authorization/">Adapting authentication to a cloud-centric landscape</a> appeared first on <a rel="nofollow" href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>What true diversity in the cybersecurity industry looks like</title>
		<link>https://www.helpnetsecurity.com/2023/08/28/diversity-cybersecurity-industry-video/</link>
		
		<dc:creator><![CDATA[Help Net Security]]></dc:creator>
		<pubDate>Mon, 28 Aug 2023 04:00:56 +0000</pubDate>
				<category><![CDATA[Don't miss]]></category>
		<category><![CDATA[Hot stuff]]></category>
		<category><![CDATA[Video]]></category>
		<category><![CDATA[boardroom]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Cyversity]]></category>
		<category><![CDATA[how-to]]></category>
		<category><![CDATA[RegScale]]></category>
		<category><![CDATA[strategy]]></category>
		<category><![CDATA[tips]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=273722</guid>

					<description><![CDATA[<p>In this Help Net Security video, Larry Whiteside, Jr., CISO at RegScale and President of Cyversity, discusses how, now more than ever, the cybersecurity industry needs the diversity of thought to address the increasingly complex and technology-driven challenges organizations face.</p>
<p>The post <a rel="nofollow" href="https://www.helpnetsecurity.com/2023/08/28/diversity-cybersecurity-industry-video/">What true diversity in the cybersecurity industry looks like</a> appeared first on <a rel="nofollow" href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Experts demand clarity as they struggle with cloud security prioritization</title>
		<link>https://www.helpnetsecurity.com/2023/08/28/cloud-native-application-protection-platforms-cnapp/</link>
		
		<dc:creator><![CDATA[Help Net Security]]></dc:creator>
		<pubDate>Mon, 28 Aug 2023 03:30:48 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cloud Security Alliance]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[incident response]]></category>
		<category><![CDATA[misconfiguration]]></category>
		<category><![CDATA[report]]></category>
		<category><![CDATA[zero trust]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=274076</guid>

					<description><![CDATA[<p>Cloud Native Application Protection Platforms (CNAPPs) have emerged as a critical category of security tooling in recent years due to the complexity of comprehensively securing multi-cloud environments, according to Cloud Security Alliance. Secure cloud computing environment Much of CNAPPs popularity has been driven by their ability to consolidate the capabilities of the numerous security tools organizations current deploy, namely Cloud Security Posture Management (CSPM), Cloud Workload Protection (CWP), and Cloud Infrastructure Entitlement Management (CIEM), network &#8230; <a href="https://www.helpnetsecurity.com/2023/08/28/cloud-native-application-protection-platforms-cnapp/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a rel="nofollow" href="https://www.helpnetsecurity.com/2023/08/28/cloud-native-application-protection-platforms-cnapp/">Experts demand clarity as they struggle with cloud security prioritization</a> appeared first on <a rel="nofollow" href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Customizing LLMs for domain-specific tasks</title>
		<link>https://www.helpnetsecurity.com/2023/08/28/customized-llms/</link>
		
		<dc:creator><![CDATA[Help Net Security]]></dc:creator>
		<pubDate>Mon, 28 Aug 2023 03:00:57 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[enterprise]]></category>
		<category><![CDATA[Generative AI]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[Predibase]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[report]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=274067</guid>

					<description><![CDATA[<p>The expansion of large language models (LLMs) in recent times has brought about a revolutionary change in machine learning processes and has introduced fresh perspectives on the potential of AI, according to Predibase. Based on survey data from organizations experimenting with LLMs, researchers have found that enterprises are looking for ways to customize and deploy open-source LLMs without giving commercial vendors access to proprietary data, and they are exploring other use cases beyond generative AI &#8230; <a href="https://www.helpnetsecurity.com/2023/08/28/customized-llms/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a rel="nofollow" href="https://www.helpnetsecurity.com/2023/08/28/customized-llms/">Customizing LLMs for domain-specific tasks</a> appeared first on <a rel="nofollow" href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Week in review: Security Onion 2.4 released, WinRAR vulnerable to RCE</title>
		<link>https://www.helpnetsecurity.com/2023/08/27/week-in-review-security-onion-2-4-released-winrar-vulnerable-to-rce/</link>
		
		<dc:creator><![CDATA[Help Net Security]]></dc:creator>
		<pubDate>Sun, 27 Aug 2023 08:00:32 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Week in review]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=274055</guid>

					<description><![CDATA[<p>Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Network detection and response in the modern era In this Help Net Security interview, David Gugelmann, CEO at Exeon, sheds light on the current cyber threats and their challenges for network security. He discusses the role of Network Detection and Response (NDR) solutions that leverage machine learning algorithms to improve threat detection and streamline incident response. Lazarus Group exploited ManageEngine &#8230; <a href="https://www.helpnetsecurity.com/2023/08/27/week-in-review-security-onion-2-4-released-winrar-vulnerable-to-rce/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a rel="nofollow" href="https://www.helpnetsecurity.com/2023/08/27/week-in-review-security-onion-2-4-released-winrar-vulnerable-to-rce/">Week in review: Security Onion 2.4 released, WinRAR vulnerable to RCE</a> appeared first on <a rel="nofollow" href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>ClearSale launches Client Portal to help customers view and manage fraud prevention data</title>
		<link>https://www.helpnetsecurity.com/2023/08/25/clearsale-client-portal/</link>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Fri, 25 Aug 2023 15:00:41 +0000</pubDate>
				<category><![CDATA[Industry news]]></category>
		<category><![CDATA[ClearSale]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=274132</guid>

					<description><![CDATA[<p>ClearSale has released its new Client Portal. Used by ClearSale customers to view and manage their fraud prevention data, orders, and chargebacks, the portal offers enhanced functionality and a streamlined interface. The ClearSale Client Portal offers the ability to see fraud detection and prevention information from a high level all the way down to individual transactions. Now, with the reimagined interface, customers will have a sleek and intuitive user experience and new features, making understanding &#8230; <a href="https://www.helpnetsecurity.com/2023/08/25/clearsale-client-portal/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a rel="nofollow" href="https://www.helpnetsecurity.com/2023/08/25/clearsale-client-portal/">ClearSale launches Client Portal to help customers view and manage fraud prevention data</a> appeared first on <a rel="nofollow" href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Kyndryl and Cisco expand partnership to help customers respond to cyber incidents</title>
		<link>https://www.helpnetsecurity.com/2023/08/25/kyndryl-cisco/</link>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Fri, 25 Aug 2023 14:00:42 +0000</pubDate>
				<category><![CDATA[Industry news]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Kyndryl]]></category>
		<guid isPermaLink="false">https://www.helpnetsecurity.com/?p=274129</guid>

					<description><![CDATA[<p>Kyndryl has expanded technology partnership with Cisco to deliver services focused on cyber resilience. Through this partnership, Kyndryl will utilize Cisco’s comprehensive portfolio of network software, hardware and equipment with Kyndryl’s cyber resilience framework to help customers proactively address and respond to cyber incidents. Cisco’s open platform (Cisco Security Cloud) will allow Kyndryl to integrate multi-vendor solutions and provide a more cohesive and integrated solution. Kyndryl Consult experts, along with managed services for cyber resilience, &#8230; <a href="https://www.helpnetsecurity.com/2023/08/25/kyndryl-cisco/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a rel="nofollow" href="https://www.helpnetsecurity.com/2023/08/25/kyndryl-cisco/">Kyndryl and Cisco expand partnership to help customers respond to cyber incidents</a> appeared first on <a rel="nofollow" href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>
