Don’t miss

“Security researcher” offers to delete data stolen by ransomware attackers

“Security researcher” offers to delete data stolen by ransomware attackers 2024-01-09 at 12:32 By Zeljka Zorz When organizations get hit by ransomware and pay the crooks to decrypt the encrypted data and delete the stolen data, they can never be entirely sure the criminals will do as they promised. And even if an organization gets […]

React to this headline:

Loading spinner

“Security researcher” offers to delete data stolen by ransomware attackers Read More »

If you prepare, a data security incident will not cause an existential crisis

If you prepare, a data security incident will not cause an existential crisis 2024-01-09 at 08:02 By Help Net Security Why is it that when a company becomes aware of a potential data security incident, the team working on it (and others who are made aware that “something” is going on) have an immediate and

React to this headline:

Loading spinner

If you prepare, a data security incident will not cause an existential crisis Read More »

Understanding zero-trust design philosophy and principles

Understanding zero-trust design philosophy and principles 2024-01-09 at 07:32 By Mirko Zorz In this Help Net Security interview, Phil Vachon, Head of Infrastructure in the Office of the CTO at Bloomberg, discusses the varying definitions of zero trust among security professionals and companies, emphasizing its broad design philosophy. Vachon explores challenges in implementing zero trust,

React to this headline:

Loading spinner

Understanding zero-trust design philosophy and principles Read More »

The growing challenge of cyber risk in the age of synthetic media

The growing challenge of cyber risk in the age of synthetic media 2024-01-09 at 07:01 By Help Net Security As AI tools become more widespread, impersonation and deception have become easier. However, organizations are combating this issue with policies and technological solutions. In this Help Net Security video, Mike Bechtel, Chief Futurist at Deloitte, discusses

React to this headline:

Loading spinner

The growing challenge of cyber risk in the age of synthetic media Read More »

Securing AI systems against evasion, poisoning, and abuse

Securing AI systems against evasion, poisoning, and abuse 2024-01-09 at 06:32 By Mirko Zorz Adversaries can intentionally mislead or “poison” AI systems, causing them to malfunction, and developers have yet to find an infallible defense against this. In their latest publication, NIST researchers and their partners highlight these AI and machine learning vulnerabilities. Taxonomy of

React to this headline:

Loading spinner

Securing AI systems against evasion, poisoning, and abuse Read More »

Social engineer reveals effective tricks for real-world intrusions

Social engineer reveals effective tricks for real-world intrusions 2024-01-08 at 08:31 By Mirko Zorz In this Help Net Security interview, Jayson E. Street, Chief Adversarial Officer at Secure Yeti, discusses intriguing aspects of social engineering and unconventional methods for gathering target information. Street explores the overlooked threat of physical security and the human tendency to

React to this headline:

Loading spinner

Social engineer reveals effective tricks for real-world intrusions Read More »

Review: Engineering-grade OT security: A manager’s guide

Review: Engineering-grade OT security: A manager’s guide 2024-01-08 at 08:01 By Helga Labus Andrew Ginter is a widely-read author on industrial security and a trusted advisor for industrial enterprises. He holds a BSc. in Applied Mathematics and an MSc. in Computer Science from the University of Calgary. He developed control system software products for Hewlett

React to this headline:

Loading spinner

Review: Engineering-grade OT security: A manager’s guide Read More »

AuthLogParser: Open-source tool for analyzing Linux authentication logs

AuthLogParser: Open-source tool for analyzing Linux authentication logs 2024-01-08 at 07:31 By Mirko Zorz AuthLogParser is an open-source tool tailored for digital forensics and incident response, specifically crafted to analyze Linux authentication logs (auth.log). The tool examines the auth.log file, extracting crucial details like SSH logins, user creations, event names, IP addresses, among others. It

React to this headline:

Loading spinner

AuthLogParser: Open-source tool for analyzing Linux authentication logs Read More »

Top 2024 AppSec predictions

Top 2024 AppSec predictions 2024-01-08 at 07:01 By Help Net Security In this Help Net Security video, Shahar Man, CEO of Backslash Security, offers his top three AppSec predictions for 2024, uncovering future trends. The post Top 2024 AppSec predictions appeared first on Help Net Security. This article is an excerpt from Help Net Security

React to this headline:

Loading spinner

Top 2024 AppSec predictions Read More »

January 2024 Patch Tuesday forecast: A Focus on Printing

January 2024 Patch Tuesday forecast: A Focus on Printing 2024-01-05 at 08:16 By Help Net Security Happy 2024 Everyone! I hope everyone is looking forward to another exciting year in the ever-changing world of IT operations and software security. This article aims to provide a quick summary of some of the latest trends, announcements, and

React to this headline:

Loading spinner

January 2024 Patch Tuesday forecast: A Focus on Printing Read More »

Breaking down the state of authentication

Breaking down the state of authentication 2024-01-05 at 07:02 By Help Net Security In this Help Net Security video, Bassam Al-Khalidi, co-CEO of Axiad, discusses the results of Axiad’s recent State of Authentication Survey. Key findings from the survey revealed: – 39% indicated phishing is the most feared cyberattack, while 49% said it is the

React to this headline:

Loading spinner

Breaking down the state of authentication Read More »

Escalating cyber threats: Bots, fraud farms, and cryptojacking surge, urgently requiring attention

Escalating cyber threats: Bots, fraud farms, and cryptojacking surge, urgently requiring attention 2024-01-05 at 06:32 By Help Net Security The motivations behind cyberattacks are as diverse as the methods employed. Whether driven by financial gain, political agendas, or sheer malice, cybercriminals exploit weaknesses in cybersecurity defenses, seeking entry points to compromise sensitive data, disrupt critical

React to this headline:

Loading spinner

Escalating cyber threats: Bots, fraud farms, and cryptojacking surge, urgently requiring attention Read More »

DriveFS Sleuth: Open-source tool for investigating Google Drive File Stream’s disk forensic artifacts

DriveFS Sleuth: Open-source tool for investigating Google Drive File Stream’s disk forensic artifacts 2024-01-04 at 07:31 By Mirko Zorz DriveFS Sleuth automates the investigation of Google Drive File Stream disk artifacts. The tool can parse the disk artifacts and build a filesystem tree-like structure enumerating the synchronized files along with their respective properties. “While engaged

React to this headline:

Loading spinner

DriveFS Sleuth: Open-source tool for investigating Google Drive File Stream’s disk forensic artifacts Read More »

15 open-source cybersecurity tools you’ll wish you’d known earlier

15 open-source cybersecurity tools you’ll wish you’d known earlier 2024-01-04 at 07:01 By Help Net Security Open-source tools represent a dynamic force in the technological landscape, embodying innovation, collaboration, and accessibility. These tools, developed with transparency and community-driven principles, empower users with the freedom to scrutinize, modify, and adapt solutions according to their unique needs.

React to this headline:

Loading spinner

15 open-source cybersecurity tools you’ll wish you’d known earlier Read More »

The dynamic relationship between AI and application development

The dynamic relationship between AI and application development 2024-01-04 at 06:31 By Help Net Security In this Help Net Security video, Greg Ellis, General Manager, Application Security, at Digital.ai, discusses how artificial intelligence is revolutionizing the way applications are developed and redefining the possibilities within the tech industry. The post The dynamic relationship between AI

React to this headline:

Loading spinner

The dynamic relationship between AI and application development Read More »

Cybersecurity challenges emerge in the wake of API expansion

Cybersecurity challenges emerge in the wake of API expansion 2024-01-03 at 08:01 By Mirko Zorz In this Help Net Security interview, Vedran Cindric, CEO at Treblle, discusses the exponential growth of AI-related APIs, citing a 96% increase in 2023. He sheds light on the integral role APIs play in powering AI interactions, revealing the invisible

React to this headline:

Loading spinner

Cybersecurity challenges emerge in the wake of API expansion Read More »

Emerging cybersecurity trends and expectations for 2024

Emerging cybersecurity trends and expectations for 2024 2024-01-03 at 07:31 By Help Net Security In this Help Net Security video, John Dwyer, Head of Research at IBM X-Force, discusses how 2024 is poised to be an incredibly impactful year for cyber attacks, driven by world events and access to advanced technologies like AI. The post

React to this headline:

Loading spinner

Emerging cybersecurity trends and expectations for 2024 Read More »

Facts and misconceptions about cybersecurity budgets

Facts and misconceptions about cybersecurity budgets 2024-01-03 at 07:01 By Help Net Security Managing and allocating budgets for cybersecurity and IT has become an increasingly critical aspect of organizational strategy. Organizations recognize the need to invest significantly in cybersecurity to safeguard sensitive data, protect against ransomware attacks, and ensure the integrity of their IT infrastructure.

React to this headline:

Loading spinner

Facts and misconceptions about cybersecurity budgets Read More »

29 malware families target 1,800 banking apps worldwide

29 malware families target 1,800 banking apps worldwide 2024-01-03 at 06:31 By Help Net Security Mobile banking is outpacing online banking across all age groups due to its convenience and our desire to have those apps at our fingertips, according to Zimperium. However, this surge is accompanied by a dramatic growth in financial fraud. The

React to this headline:

Loading spinner

29 malware families target 1,800 banking apps worldwide Read More »

Key cybersecurity skills gap statistics you should be aware of

Key cybersecurity skills gap statistics you should be aware of 2024-01-02 at 07:31 By Help Net Security As the sophistication and frequency of cyber threats continue to escalate, the demand for skilled cybersecurity professionals has never been bigger. The skills gap is not merely a statistical discrepancy; it represents a substantial vulnerability in the defense

React to this headline:

Loading spinner

Key cybersecurity skills gap statistics you should be aware of Read More »

Scroll to Top