Category: HelpnetSecurity

Pathlock CAC helps SAP customers comply with regulations
06
Mar
2024

Pathlock CAC helps SAP customers comply with regulations

Pathlock intorduced its SAP application and data security product suite, Cybersecurity Application Controls (CAC). The release is part of Pathlock’s…

Apple fixes two actively exploited iOS zero-days (CVE-2024-23225, CVE-2024-23296)
06
Mar
2024

Apple fixes two actively exploited iOS zero-days (CVE-2024-23225, CVE-2024-23296)

Apple has fixed two iOS zero-day vulnerabilities (CVE-2024-23225, CVE-2024-23296) exploited by attackers in the wild. CVE-2024-23225 and CVE-2024-23296 On Tuesday,…

AI tools put companies at risk of data exfiltration
06
Mar
2024

AI tools put companies at risk of data exfiltration

Data loss from insiders continues to pose a growing threat to security, with emerging technologies such as AI and generative…

5 ways to keep API integrations secure
06
Mar
2024

5 ways to keep API integrations secure

API integrations often handle sensitive data, such as employees’ personally identifiable information (PII), companies’ financial information, or even clients’ payment…

RiskInDroid: Open-source risk analysis of Android apps
06
Mar
2024

RiskInDroid: Open-source risk analysis of Android apps

RiskInDroid (Risk Index for Android) is an open-source tool for quantitative risk analysis of Android applications based on machine learning…

How to create an efficient governance control program
06
Mar
2024

How to create an efficient governance control program

Your success as an organization, especially in the cyber realm, depends on your security posture. To account for the ongoing…

Delinea Privilege Control for Servers enforces least privilege principles on critical systems
05
Mar
2024

Delinea Privilege Control for Servers enforces least privilege principles on critical systems

Delinea announced the introduction of Privilege Control for Servers on the Delinea Platform, enforcing least privilege principles on critical systems…

Hundreds of orgs targeted with emails aimed at stealing NTLM authentication hashes
05
Mar
2024

Hundreds of orgs targeted with emails aimed at stealing NTLM authentication hashes

A threat actor specializing in establishing initial access to target organizations’ computer systems and networks is using booby-trapped email attachments…

Organizations are knowingly releasing vulnerable applications
05
Mar
2024

Organizations are knowingly releasing vulnerable applications

92% of companies had experienced a breach in the prior year due to vulnerabilities of applications developed in-house, according to…

Why cyber maturity assessment should become standard practice
05
Mar
2024

Why cyber maturity assessment should become standard practice

Understanding risk is one thing, but how do you know if your organization has what it takes to withstand those…

3 free data protection regulation courses you can take right now
05
Mar
2024

3 free data protection regulation courses you can take right now

Increasingly, information about us, and even by us, is being processed. Even mundane or insignificant details can be combined and…

What organizations need to know about the Digital Operational Resilience Act (DORA)
05
Mar
2024

What organizations need to know about the Digital Operational Resilience Act (DORA)

In this Help Net Security interview, Kris Lovejoy, Global Security and Resilience Leader at Kyndryl, discusses the impact of the…