Zeljka Zorz

Zeljka Zorz, Managing Editor of Help Net Security and (IN)SECURE Magazine.

Categories
N/A
Content Types
N/A
More Information
Location|Languages
Publications
N/A

Published Content

3873
helpnetsecurity.com
Article
Attackers are exploiting IMAP to bypass MFA on Office 365, G Suite accounts
March, 20 2019
helpnetsecurity.com
Article
Norsk Hydro cyber attack: What happened?
March, 20 2019
helpnetsecurity.com
Article
Mirai variant picks up new tricks, expands list of targeted devices
March, 19 2019
helpnetsecurity.com
Article
Cryptojacking of businesses' cloud resources still going strong
March, 18 2019
helpnetsecurity.com
Article
Unsecured Gearbest server exposes millions of shoppers and their orders
March, 15 2019
helpnetsecurity.com
Article
Two thirds of Android antimalware apps are ineffective or unreliable
March, 14 2019
helpnetsecurity.com
Article
Public-interest technology: Why companies should get involved
March, 14 2019
helpnetsecurity.com
Article
Mozilla releases Firefox Send, a free encrypted file transfer service
March, 13 2019
helpnetsecurity.com
Article
March 2019 Patch Tuesday: Microsoft patches two actively exploited Windows flaws
March, 13 2019
helpnetsecurity.com
Article
Marriott CEO reveals more details about the massive data breach
March, 12 2019
helpnetsecurity.com
Article
Is your company leaking sensitive data via its Box account?
March, 12 2019
helpnetsecurity.com
Article
Free decrypters for BigBobRoss ransomware released
March, 11 2019
helpnetsecurity.com
Article
Researchers create system that predicts vulnerability severity from tweets
March, 8 2019
helpnetsecurity.com
Article
Zero-day Chrome/Windows combo actively exploited in the wild
March, 8 2019
helpnetsecurity.com
Article
Windows Servers in danger of being compromised via WDS bug
March, 7 2019
helpnetsecurity.com
Article
Users of Cisco switches, security appliances need to get patching
March, 7 2019
helpnetsecurity.com
Article
Users are too confident in their protection from threats
March, 6 2019
helpnetsecurity.com
Article
Chronicle creates Backstory, a cloud service for analyzing enterprises' security data
March, 5 2019
helpnetsecurity.com
Article
Bug in Cobalt Strike pentesting tool used to identify malicious servers
March, 1 2019
helpnetsecurity.com
Article
Phishing, software supply chain attacks greatest threats for businesses
February, 28 2019
helpnetsecurity.com
Article
Cisco SOHO wireless VPN firewalls and routers open to attack
February, 28 2019
helpnetsecurity.com
Article
Modern browser APIs can be abused for hijacking device resources
February, 27 2019
helpnetsecurity.com
Article
PDF viewers, online validation services vulnerable to digital signature spoofing attacks
February, 26 2019
helpnetsecurity.com
Article
Latest WinRAR, Drupal flaws under active exploitation
February, 26 2019
helpnetsecurity.com
Article
OSSPatcher: Automated mobile application patching for bugs in open source libraries
February, 26 2019
helpnetsecurity.com
Article
New privacy-breaking attacks against phones on 4G and 5G cellular networks
February, 25 2019
helpnetsecurity.com
Article
Should you trust that Chrome extension? Use CRXcavator to decide
February, 22 2019
helpnetsecurity.com
Article
Cisco fixes risky flaws in HyperFlex and Prime infrastructure
February, 21 2019
helpnetsecurity.com
Article
Highly critical Drupal RCE flaw could lead to new Drupalgeddon, patch now!
February, 21 2019
helpnetsecurity.com
Article
500,000+ WinRAR users open to compromise via a 19-year-old flaw
February, 21 2019
helpnetsecurity.com
Article
How are businesses facing the cybersecurity challenges of increasing cloud adoption?
February, 21 2019
helpnetsecurity.com
Article
Phishers' new trick for bypassing email URL filters
February, 20 2019
helpnetsecurity.com
Article
Rockwell Automation industrial energy meter vulnerable to public exploits
February, 20 2019
helpnetsecurity.com
Article
Flawed password managers allow malware to steal passwords from computer memory
February, 20 2019
helpnetsecurity.com
Article
Detecting Trojan attacks against deep neural networks
February, 19 2019
helpnetsecurity.com
Article
IT security incidents affecting German critical infrastructure are on the rise
February, 19 2019
helpnetsecurity.com
Article
Azure AD Identity Protection now revolves around risky users and risky sign-ins
February, 15 2019
helpnetsecurity.com
Article
Mozilla will use AI coding assistant to preemptively catch Firefox bugs
February, 15 2019
helpnetsecurity.com
Article
Bank of Valletta suspended all operations in wake of cyber attack
February, 14 2019
helpnetsecurity.com
Article
Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises
February, 14 2019
helpnetsecurity.com
Article
Snapd flaw gives attackers root access on Linux systems
February, 13 2019
helpnetsecurity.com
Article
February 2019 Patch Tuesday: PrivExchange hole plugged
February, 13 2019
helpnetsecurity.com
Article
Hackers hit VFEmail, wipe US servers and backups
February, 12 2019
helpnetsecurity.com
Article
RunC container escape flaw enables root access to host system
February, 12 2019
helpnetsecurity.com
Article
OkCupid account hijackings highlight website account management issues
February, 12 2019
helpnetsecurity.com
Article
BEC-style attacks exploded in Q4 2018
February, 11 2019
helpnetsecurity.com
Article
Adiantum: A new encryption scheme for low-end Android devices
February, 8 2019
helpnetsecurity.com
Article
Apple fixes FaceTime eavesdropping bug, two iOS zero-days
February, 8 2019
helpnetsecurity.com
Article
How today's workforce stays secure and what apps it prefers
February, 7 2019
helpnetsecurity.com
Article
70 real-life hackers and cybersecurity practitioners share their personal insights
February, 6 2019
Authorship Stats
3Sites3,873Projects1,492,770Words
About
Zeljka Zorz is a writer who has produced content for helpnetsecurity.com
Key Phrases
Code Execution, Email Address, Remote Code, Open Source, Researchers Noted, Specially Crafted, Iot Devices, Office 365, Supply Chain, Flash Player
© ClearVoice, Inc.