credentials

How much does cloud-based identity expand your attack surface?

How much does cloud-based identity expand your attack surface? 2024-03-29 at 08:01 By Help Net Security We all know using a cloud-based identity provider (IdP) expands your attack surface, but just how big does that attack surface get? And can we even know for sure? As Michael Jordan once said, “Get the fundamentals down, and […]

React to this headline:

Loading spinner

How much does cloud-based identity expand your attack surface? Read More »

Key MITRE ATT&CK techniques used by cyber attackers

Key MITRE ATT&CK techniques used by cyber attackers 2024-03-15 at 11:01 By Help Net Security While the threat landscape continues to shift and evolve, attackers’ motivations do not, according to a Red Canary report. The classic tools and techniques adversaries deploy remain consistent–with some notable exceptions. The report tracked MITRE ATT&CK techniques that adversaries abuse

React to this headline:

Loading spinner

Key MITRE ATT&CK techniques used by cyber attackers Read More »

Securing the future: Addressing cybersecurity challenges in the education sector

Securing the future: Addressing cybersecurity challenges in the education sector 2024-03-08 at 07:03 By Help Net Security In this Help Net Security video, Kory Daniels, CISO at Trustwave, shines a light on the impact the current threat environment can have for both universities and students. Key findings from a recent Trustwave report include: – 1.8

React to this headline:

Loading spinner

Securing the future: Addressing cybersecurity challenges in the education sector Read More »

Using AI to reduce false positives in secrets scanners

Using AI to reduce false positives in secrets scanners 2024-02-27 at 08:02 By Help Net Security As development environments grow more complex, applications increasingly communicate with many external services. When a software development project communicates with an external service, it utilizes a token or “secret” for authentication. These tokens are the glue that keeps any

React to this headline:

Loading spinner

Using AI to reduce false positives in secrets scanners Read More »

The old, not the new: Basic security issues still biggest threat to enterprises

The old, not the new: Basic security issues still biggest threat to enterprises 2024-02-23 at 08:01 By Help Net Security In 2023, cybercriminals saw more opportunities to “log in” versus hack into corporate networks through valid accounts – making this tactic a preferred weapon for threat actors, according to IBM’s 2024 X-Force Threat Intelligence Index.

React to this headline:

Loading spinner

The old, not the new: Basic security issues still biggest threat to enterprises Read More »

Secure email gateways struggle to keep pace with sophisticated phishing campaigns

Secure email gateways struggle to keep pace with sophisticated phishing campaigns 2024-02-23 at 07:02 By Help Net Security In 2023, malicious email threats bypassing secure email gateways (SEGs) increased by more than 100%, according to Cofense. In just two years, Cofense identified over 1.5 million malicious emails bypassing their customers’ SEGs, signaling a 37% increase

React to this headline:

Loading spinner

Secure email gateways struggle to keep pace with sophisticated phishing campaigns Read More »

Attack velocity surges with average breakout time down to only 62 minutes

Attack velocity surges with average breakout time down to only 62 minutes 2024-02-22 at 07:31 By Help Net Security The speed of cyberattacks continues to accelerate at an alarming rate, according to CrowdStrike. Adversaries increasingly exploit stolen credentials The speed of cyberattacks continues to accelerate at an alarming rate. The report indicates that the average

React to this headline:

Loading spinner

Attack velocity surges with average breakout time down to only 62 minutes Read More »

Understanding the tactics of stealthy hunter-killer malware

Understanding the tactics of stealthy hunter-killer malware 2024-02-15 at 06:31 By Help Net Security Picus Security has revealed a rise in hunter-killer malware, highlighting a significant shift in adversaries’ capability to pinpoint and thwart advanced enterprise defenses, including next-gen firewalls, antivirus programs, and EDR systems. There was a 333% increase in malware that can actively

React to this headline:

Loading spinner

Understanding the tactics of stealthy hunter-killer malware Read More »

AnyDesk has been hacked, users urged to change passwords

AnyDesk has been hacked, users urged to change passwords 2024-02-05 at 14:31 By Zeljka Zorz AnyDesk Software GmbH, the German company behind the widely used (and misused) remote desktop application of the same name, has confirmed they’ve been hacked and their production systems have been compromised. The statement was published on Friday evening and lacks

React to this headline:

Loading spinner

AnyDesk has been hacked, users urged to change passwords Read More »

WhatsApp, Slack, Teams, and other messaging platforms face constant security risks

WhatsApp, Slack, Teams, and other messaging platforms face constant security risks 12/12/2023 at 07:03 By Help Net Security 42% of businesses report employees with BYOD devices in business settings that use tools like WhatsApp have led to new security incidents, according to SafeGuard Cyber. Messaging platforms like WhatsApp, Telegram, Slack, and Teams face constant threats,

React to this headline:

Loading spinner

WhatsApp, Slack, Teams, and other messaging platforms face constant security risks Read More »

Infostealers and the high value of stolen data

Infostealers and the high value of stolen data 13/11/2023 at 08:35 By Help Net Security The risk of personal and professional data being stolen by nefarious actors looms larger than ever, according to Trend Micro. Understanding the risks associated with data theft, which include identity theft, financial loss, reputational harm, and the potential misuse of

React to this headline:

Loading spinner

Infostealers and the high value of stolen data Read More »

Sumo Logic discloses potential breach via compromised AWS credential

Sumo Logic discloses potential breach via compromised AWS credential 08/11/2023 at 14:49 By Helga Labus Cloud-native big data and security analytics firm Sumo Logic is investigating a potential security incident within their platform, the company revealed on Tuesday. The Sumo Logic incident “On Friday, November 3rd, 2023, Sumo Logic discovered evidence of a potential security

React to this headline:

Loading spinner

Sumo Logic discloses potential breach via compromised AWS credential Read More »

How global password practices are changing

How global password practices are changing 06/11/2023 at 09:33 By Help Net Security Password health and hygiene improved globally over the past year, reducing the risk of account takeover for consumers and businesses, according to Dashlane. Password reuse remains prevalent, however, leaving user accounts particularly vulnerable to password-spraying attacks if they’re not protected by strong

React to this headline:

Loading spinner

How global password practices are changing Read More »

How human behavior research informs security strategies

How human behavior research informs security strategies 02/11/2023 at 08:01 By Mirko Zorz In this Help Net Security interview, Kai Roer, CEO at Praxis Security Labs, explores the theoretical underpinnings, practical implications, and the crucial role of human behavior in cybersecurity. Roer explains why a comprehensive understanding of human complexity is paramount in today’s security

React to this headline:

Loading spinner

How human behavior research informs security strategies Read More »

IAM Credentials in Public GitHub Repositories Harvested in Minutes

IAM Credentials in Public GitHub Repositories Harvested in Minutes 31/10/2023 at 18:49 By Ionut Arghire A threat actor is reportedly harvesting IAM credentials from public GitHub repositories within five minutes of exposure. The post IAM Credentials in Public GitHub Repositories Harvested in Minutes appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

IAM Credentials in Public GitHub Repositories Harvested in Minutes Read More »

How passkeys are changing the face of authentication

How passkeys are changing the face of authentication 23/10/2023 at 08:05 By Help Net Security As passwordless identity becomes mainstream, the term “passkey” is quickly becoming a new buzzword in cybersecurity. But what exactly is a passkey and why do we need them? A passkey is a digital credential that can only be used by

React to this headline:

Loading spinner

How passkeys are changing the face of authentication Read More »

Securing GitHub Actions for a safer DevOps pipeline

Securing GitHub Actions for a safer DevOps pipeline 02/10/2023 at 07:32 By Mirko Zorz GitHub Actions provides a platform for continuous integration and continuous delivery (CI/CD), enabling your build, test, and deployment process automation. It allows you to establish workflows that build and test each pull request in your repository and deploy approved pull requests

React to this headline:

Loading spinner

Securing GitHub Actions for a safer DevOps pipeline Read More »

Protecting against FraudGPT, ChatGPT’s evil twin

Protecting against FraudGPT, ChatGPT’s evil twin 02/10/2023 at 07:01 By Help Net Security FraudGPT is the evil counterpart to ChatGPT. Criminals use it to target businesses with phishing emails and scams with speed and accuracy like never before. The AI can be prompted to create the most realistic phishing emails, perfected down to a business’

React to this headline:

Loading spinner

Protecting against FraudGPT, ChatGPT’s evil twin Read More »

Is your identity safe? Exploring the gaps in threat protection

Is your identity safe? Exploring the gaps in threat protection 27/09/2023 at 07:01 By Help Net Security A recent study from Silverfort has identified the identity attack surface as today’s most substantial weakness in cybersecurity resilience. Traditional approaches, such as MFA and PAM, have notable limitations that can lead to the exploitation of stolen credentials.

React to this headline:

Loading spinner

Is your identity safe? Exploring the gaps in threat protection Read More »

Never use your master password as a password on other accounts

Never use your master password as a password on other accounts 19/09/2023 at 08:33 By Helga Labus One in three Americans now use password managers, up from one in five in 2022, according to an online poll by Security.org that quizzed 1,051 American adults on how they use passwords and password managers. How users choose

React to this headline:

Loading spinner

Never use your master password as a password on other accounts Read More »

Optimized by Optimole
Scroll to Top