Congratulations!

[Valid RSS] This is a valid RSS feed.

Recommendations

This feed is valid, but interoperability with the widest range of feed readers could be improved by implementing the following recommendations.

Source: http://feeds.feedburner.com/HelpNetSecurity

  1. <?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
  2. xmlns:content="http://purl.org/rss/1.0/modules/content/"
  3. xmlns:wfw="http://wellformedweb.org/CommentAPI/"
  4. xmlns:dc="http://purl.org/dc/elements/1.1/"
  5. xmlns:atom="http://www.w3.org/2005/Atom"
  6. xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  7. xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
  8. >
  9.  
  10. <channel>
  11. <title>Help Net Security</title>
  12. <atom:link href="https://www.helpnetsecurity.com/feed/" rel="self" type="application/rss+xml" />
  13. <link>https://www.helpnetsecurity.com/</link>
  14. <description>Daily information security news with a focus on enterprise security.</description>
  15. <lastBuildDate>Fri, 17 May 2024 11:34:07 +0000</lastBuildDate>
  16. <language>en-US</language>
  17. <sy:updatePeriod>
  18. hourly </sy:updatePeriod>
  19. <sy:updateFrequency>
  20. 1 </sy:updateFrequency>
  21. <generator>https://wordpress.org/?v=6.4.3</generator>
  22.  
  23. <image>
  24. <url>https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093400/cropped-hns2-32x32.png</url>
  25. <title>Help Net Security</title>
  26. <link>https://www.helpnetsecurity.com/</link>
  27. <width>32</width>
  28. <height>32</height>
  29. </image>
  30. <item>
  31. <title>US exposes scheme enabling North Korean IT workers to bypass sanctions</title>
  32. <link>https://www.helpnetsecurity.com/2024/05/17/north-korean-it-workers/</link>
  33. <dc:creator><![CDATA[Zeljka Zorz]]></dc:creator>
  34. <pubDate>Fri, 17 May 2024 11:34:07 +0000</pubDate>
  35. <category><![CDATA[Don't miss]]></category>
  36. <category><![CDATA[Hot stuff]]></category>
  37. <category><![CDATA[News]]></category>
  38. <category><![CDATA[DOJ]]></category>
  39. <category><![CDATA[enterprise]]></category>
  40. <category><![CDATA[North Korea]]></category>
  41. <category><![CDATA[tips]]></category>
  42. <category><![CDATA[USA]]></category>
  43. <guid isPermaLink="false">https://www.helpnetsecurity.com/?p=301683</guid>
  44.  
  45. <description><![CDATA[<p>The US Justice Department had unsealed charges against a US woman and an Ukranian man who, along with three unidentified foreign nationals, have allegedly helped North Korean IT workers work remotely for US companies under assumed US identities and thus evade sanctions. At the same time, the US State Department has announced that its Rewards for Justice (RFJ) program is offering &#8220;a reward of up to $5 million for information that leads to the disruption &#8230; <a href="https://www.helpnetsecurity.com/2024/05/17/north-korean-it-workers/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
  46. <p>The post <a href="https://www.helpnetsecurity.com/2024/05/17/north-korean-it-workers/">US exposes scheme enabling North Korean IT workers to bypass sanctions</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
  47. ]]></description>
  48. </item>
  49. <item>
  50. <title>The importance of access controls in incident response</title>
  51. <link>https://www.helpnetsecurity.com/2024/05/17/incident-response-access-controls/</link>
  52. <dc:creator><![CDATA[Help Net Security]]></dc:creator>
  53. <pubDate>Fri, 17 May 2024 09:30:12 +0000</pubDate>
  54. <category><![CDATA[Don't miss]]></category>
  55. <category><![CDATA[Expert analysis]]></category>
  56. <category><![CDATA[Expert corner]]></category>
  57. <category><![CDATA[Hot stuff]]></category>
  58. <category><![CDATA[News]]></category>
  59. <category><![CDATA[access control]]></category>
  60. <category><![CDATA[authentication]]></category>
  61. <category><![CDATA[cybersecurity]]></category>
  62. <category><![CDATA[identity]]></category>
  63. <category><![CDATA[incident response]]></category>
  64. <category><![CDATA[opinion]]></category>
  65. <category><![CDATA[Rootly]]></category>
  66. <guid isPermaLink="false">https://www.helpnetsecurity.com/?p=301640</guid>
  67.  
  68. <description><![CDATA[<p>The worst time to find out your company doesn’t have adequate access controls is when everything is on fire. The worst thing that can happen during an incident is that your development and operations teams are blocked from solving the problem. That’s why having adequate identity access management (IAM) policies in place – which include both authorization (AuthZ) and authentication (AuthN) – is especially critical when it comes to your incident management tooling. The difference &#8230; <a href="https://www.helpnetsecurity.com/2024/05/17/incident-response-access-controls/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
  69. <p>The post <a href="https://www.helpnetsecurity.com/2024/05/17/incident-response-access-controls/">The importance of access controls in incident response</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
  70. ]]></description>
  71. </item>
  72. <item>
  73. <title>Kroll expands its document review capabilities to accelerate incident response</title>
  74. <link>https://www.helpnetsecurity.com/2024/05/17/kroll-document-review-capabilities/</link>
  75. <dc:creator><![CDATA[Industry News]]></dc:creator>
  76. <pubDate>Fri, 17 May 2024 08:00:09 +0000</pubDate>
  77. <category><![CDATA[Industry news]]></category>
  78. <guid isPermaLink="false">https://www.helpnetsecurity.com/?p=301623</guid>
  79.  
  80. <description><![CDATA[<p>Kroll expands its document review capabilities with DataminerAI to immediately pinpoint where sensitive data is located, providing faster, more efficient and affordable data mining. The technology optimizes incident response investigations and is available to all insurance carriers, law firms, and incident response providers seeking more efficient document review. Kroll partnered with eDiscovery services provider, Dauntless Discovery, to develop DataminerAI. It leverages large language models (LLM) to rapidly analyze data sets of all sizes to find &#8230; <a href="https://www.helpnetsecurity.com/2024/05/17/kroll-document-review-capabilities/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
  81. <p>The post <a href="https://www.helpnetsecurity.com/2024/05/17/kroll-document-review-capabilities/">Kroll expands its document review capabilities to accelerate incident response</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
  82. ]]></description>
  83. </item>
  84. <item>
  85. <title>GitLab unveils AI capabilities to help organizations better secure their software</title>
  86. <link>https://www.helpnetsecurity.com/2024/05/17/gitlab-duo-enterprise/</link>
  87. <dc:creator><![CDATA[Industry News]]></dc:creator>
  88. <pubDate>Fri, 17 May 2024 07:00:36 +0000</pubDate>
  89. <category><![CDATA[Industry news]]></category>
  90. <category><![CDATA[GitLab]]></category>
  91. <guid isPermaLink="false">https://www.helpnetsecurity.com/?p=301617</guid>
  92.  
  93. <description><![CDATA[<p>GitLab announced new innovations across the platform to streamline how organizations build, test, secure, and deploy software. Introducing GitLab Duo Enterprise GitLab Duo Enterprise, a new end-to-end AI add-on, combines the developer-focused AI capabilities of GitLab Duo Pro—organizational privacy controls, code suggestions, and chat—with enterprise-focused AI capabilities to help organizations proactively detect and fix security vulnerabilities, summarize issue discussions and merge requests, resolve CI/CD bottlenecks and failures, and enhance team collaboration. A new AI impact &#8230; <a href="https://www.helpnetsecurity.com/2024/05/17/gitlab-duo-enterprise/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
  94. <p>The post <a href="https://www.helpnetsecurity.com/2024/05/17/gitlab-duo-enterprise/">GitLab unveils AI capabilities to help organizations better secure their software</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
  95. ]]></description>
  96. </item>
  97. <item>
  98. <title>The IT skills shortage situation is not expected to get any better</title>
  99. <link>https://www.helpnetsecurity.com/2024/05/17/it-skills-shortage-in-organizations/</link>
  100. <dc:creator><![CDATA[Help Net Security]]></dc:creator>
  101. <pubDate>Fri, 17 May 2024 04:30:22 +0000</pubDate>
  102. <category><![CDATA[News]]></category>
  103. <category><![CDATA[cybersecurity]]></category>
  104. <category><![CDATA[IDC]]></category>
  105. <category><![CDATA[report]]></category>
  106. <category><![CDATA[skill development]]></category>
  107. <category><![CDATA[survey]]></category>
  108. <guid isPermaLink="false">https://www.helpnetsecurity.com/?p=301356</guid>
  109.  
  110. <description><![CDATA[<p>A growing IT skills shortage is impacting organizations in all industries and across all regions, according to IDC. In a recent IDC survey of North American IT leaders, nearly two thirds said that a lack of skills has resulted in missed revenue growth objectives, quality problems, and a decline in customer satisfaction. And the situation is not expected to get any better. AI skills are currently most in-demand IDC predicts that by 2026, more than &#8230; <a href="https://www.helpnetsecurity.com/2024/05/17/it-skills-shortage-in-organizations/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
  111. <p>The post <a href="https://www.helpnetsecurity.com/2024/05/17/it-skills-shortage-in-organizations/">The IT skills shortage situation is not expected to get any better</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
  112. ]]></description>
  113. </item>
  114. <item>
  115. <title>Organizations struggle to defend against ransomware</title>
  116. <link>https://www.helpnetsecurity.com/2024/05/17/ransomware-incidents-surge-video/</link>
  117. <dc:creator><![CDATA[Help Net Security]]></dc:creator>
  118. <pubDate>Fri, 17 May 2024 04:00:48 +0000</pubDate>
  119. <category><![CDATA[Don't miss]]></category>
  120. <category><![CDATA[Hot stuff]]></category>
  121. <category><![CDATA[Video]]></category>
  122. <category><![CDATA[critical infrastructure]]></category>
  123. <category><![CDATA[cybersecurity]]></category>
  124. <category><![CDATA[exploit]]></category>
  125. <category><![CDATA[extortion]]></category>
  126. <category><![CDATA[NTT Security]]></category>
  127. <category><![CDATA[ransomware]]></category>
  128. <category><![CDATA[supply chain]]></category>
  129. <category><![CDATA[video]]></category>
  130. <guid isPermaLink="false">https://www.helpnetsecurity.com/?p=300832</guid>
  131.  
  132. <description><![CDATA[<p>In this Help Net Security video, Jeremy Nichols, Director, Global Threat Intelligence Center at NTT Security Holdings, discusses a recent surge in ransomware incidents. After a down year in 2022, ransomware and extortion incidents increased in 2023. More than 5,000 ransomware victims were detected or posted across multiple social channels up from approximately 3,000 in 2022, according to the 2024 Global Threat Intelligence Report by NTT Security Holdings. Other key findings: Critical infrastructure, supply chain, &#8230; <a href="https://www.helpnetsecurity.com/2024/05/17/ransomware-incidents-surge-video/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
  133. <p>The post <a href="https://www.helpnetsecurity.com/2024/05/17/ransomware-incidents-surge-video/">Organizations struggle to defend against ransomware</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
  134. ]]></description>
  135. </item>
  136. <item>
  137. <title>Too many ICS assets are exposed to the public internet</title>
  138. <link>https://www.helpnetsecurity.com/2024/05/17/organizations-expanding-attack-surface/</link>
  139. <dc:creator><![CDATA[Help Net Security]]></dc:creator>
  140. <pubDate>Fri, 17 May 2024 03:30:09 +0000</pubDate>
  141. <category><![CDATA[News]]></category>
  142. <category><![CDATA[cybersecurity]]></category>
  143. <category><![CDATA[networks]]></category>
  144. <category><![CDATA[report]]></category>
  145. <category><![CDATA[runZero]]></category>
  146. <category><![CDATA[survey]]></category>
  147. <guid isPermaLink="false">https://www.helpnetsecurity.com/?p=301209</guid>
  148.  
  149. <description><![CDATA[<p>The enterprise attack surface is expanding in multiple ways, becoming more numerous and more specific, according to runZero. “Our research reveals alarming gaps and unexpected trends in enterprise infrastructure, including the decay of network segmentation, persistent challenges in attack surface management, and the increasing volume of dark matter on modern networks,” said HD Moore, CEO. IT and OT are converging, expanding the attack surface of organizations and requiring new techniques to discover and manage assets. &#8230; <a href="https://www.helpnetsecurity.com/2024/05/17/organizations-expanding-attack-surface/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
  150. <p>The post <a href="https://www.helpnetsecurity.com/2024/05/17/organizations-expanding-attack-surface/">Too many ICS assets are exposed to the public internet</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
  151. ]]></description>
  152. </item>
  153. <item>
  154. <title>New infosec products of the week: May 17, 2024</title>
  155. <link>https://www.helpnetsecurity.com/2024/05/17/new-infosec-products-of-the-week-may-17-2024/</link>
  156. <dc:creator><![CDATA[Help Net Security]]></dc:creator>
  157. <pubDate>Fri, 17 May 2024 03:00:17 +0000</pubDate>
  158. <category><![CDATA[News]]></category>
  159. <category><![CDATA[Calix]]></category>
  160. <category><![CDATA[FireMon]]></category>
  161. <category><![CDATA[ManageEngine]]></category>
  162. <category><![CDATA[OWASP]]></category>
  163. <guid isPermaLink="false">https://www.helpnetsecurity.com/?p=301512</guid>
  164.  
  165. <description><![CDATA[<p>Here’s a look at the most interesting products from the past week, featuring releases from Calix, FireMon, ManageEngine, and OWASP Foundation. Calix strengthens SmartBiz security with automated alerts and anti-spam compliance tools Calix unveiled updates to SmartBiz, a purpose-built small business solution for broadband service providers (BSPs), that expand an existing set of security capabilities. These enhancements help BSPs ensure the safety, security, and compliance of critical small business online activities at scale. Updates include &#8230; <a href="https://www.helpnetsecurity.com/2024/05/17/new-infosec-products-of-the-week-may-17-2024/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
  166. <p>The post <a href="https://www.helpnetsecurity.com/2024/05/17/new-infosec-products-of-the-week-may-17-2024/">New infosec products of the week: May 17, 2024</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
  167. ]]></description>
  168. </item>
  169. <item>
  170. <title>Critical Git vulnerability allows RCE when cloning repositories with submodules (CVE-2024-32002)</title>
  171. <link>https://www.helpnetsecurity.com/2024/05/16/git-cve-2024-32002/</link>
  172. <dc:creator><![CDATA[Zeljka Zorz]]></dc:creator>
  173. <pubDate>Thu, 16 May 2024 11:14:57 +0000</pubDate>
  174. <category><![CDATA[Don't miss]]></category>
  175. <category><![CDATA[Hot stuff]]></category>
  176. <category><![CDATA[News]]></category>
  177. <category><![CDATA[DevOps]]></category>
  178. <category><![CDATA[Git]]></category>
  179. <category><![CDATA[GitHub]]></category>
  180. <category><![CDATA[open source]]></category>
  181. <category><![CDATA[security update]]></category>
  182. <category><![CDATA[vulnerability]]></category>
  183. <guid isPermaLink="false">https://www.helpnetsecurity.com/?p=301563</guid>
  184.  
  185. <description><![CDATA[<p>New versions of Git are out, with fixes for five vulnerabilities, the most critical (CVE-2024-32002) of which can be used by attackers to remotely execute code during a &#8220;clone&#8221; operation. About Git Git is a widely-popular distributed version control system for collaborative software development. It can be installed on machines running Windows, macOS, Linux, and various *BSD distributions. Web-based software development platforms GitHub and GitLab are based on Git. Visual Studio, Microsoft&#8217;s integrated development environment, &#8230; <a href="https://www.helpnetsecurity.com/2024/05/16/git-cve-2024-32002/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
  186. <p>The post <a href="https://www.helpnetsecurity.com/2024/05/16/git-cve-2024-32002/">Critical Git vulnerability allows RCE when cloning repositories with submodules (CVE-2024-32002)</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
  187. ]]></description>
  188. </item>
  189. <item>
  190. <title>Google fixes third exploited Chrome zero-day in a week (CVE-2024-4947)</title>
  191. <link>https://www.helpnetsecurity.com/2024/05/16/cve-2024-4947/</link>
  192. <dc:creator><![CDATA[Zeljka Zorz]]></dc:creator>
  193. <pubDate>Thu, 16 May 2024 08:49:39 +0000</pubDate>
  194. <category><![CDATA[Don't miss]]></category>
  195. <category><![CDATA[Hot stuff]]></category>
  196. <category><![CDATA[News]]></category>
  197. <category><![CDATA[0-day]]></category>
  198. <category><![CDATA[Chrome]]></category>
  199. <category><![CDATA[exploit]]></category>
  200. <category><![CDATA[Kaspersky]]></category>
  201. <category><![CDATA[security update]]></category>
  202. <guid isPermaLink="false">https://www.helpnetsecurity.com/?p=301533</guid>
  203.  
  204. <description><![CDATA[<p>For the third time in the last seven days, Google has fixed a Chrome zero-day vulnerability (CVE-2024-4947) for which an exploit exists in the wild. About CVE-2024-4947 CVE-2024-4947 is a type confusion vulnerability in V8, Chrome’s JavaScript and WebAssembly engine. And while the two Chrome zero days fixed in the past few days have been attributed to an anonymous researcher, this time around the reporters are known: Kaspersky threat researchers Vasiliy Berdnikov and Boris Larin. &#8230; <a href="https://www.helpnetsecurity.com/2024/05/16/cve-2024-4947/" rel="nofollow">More <span class="meta-nav">&#8594;</span></a></p>
  205. <p>The post <a href="https://www.helpnetsecurity.com/2024/05/16/cve-2024-4947/">Google fixes third exploited Chrome zero-day in a week (CVE-2024-4947)</a> appeared first on <a href="https://www.helpnetsecurity.com">Help Net Security</a>.</p>
  206. ]]></description>
  207. </item>
  208. </channel>
  209. </rss>
  210.  

If you would like to create a banner that links to this page (i.e. this validation result), do the following:

  1. Download the "valid RSS" banner.

  2. Upload the image to your own server. (This step is important. Please do not link directly to the image on this server.)

  3. Add this HTML to your page (change the image src attribute if necessary):

If you would like to create a text link instead, here is the URL you can use:

http://www.feedvalidator.org/check.cgi?url=http%3A//feeds.feedburner.com/HelpNetSecurity

Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda