Category: HelpnetSecurity

Why logs aren’t enough: Enhancing SIEM with AI-driven NDR
04
Feb
2025

Why logs aren’t enough: Enhancing SIEM with AI-driven NDR

Join cybersecurity expert Jonathan Mayled from 5-hour Energy as he uncovers the limitations of log-based SIEMs and the transformative role…

Cybersecurity jobs available right now: February 4, 2025
04
Feb
2025

Cybersecurity jobs available right now: February 4, 2025

Application Security Architect ReversingLabs | Ireland | Remote – View job details As an Application Security Architect, you will conduct…

Aim for crypto-agility, prepare for the long haul
04
Feb
2025

Aim for crypto-agility, prepare for the long haul

While organizations have long experimented with various facets of digital transformation, the journey toward crypto-agility is one of the most…

What you can do to prevent workforce fraud
04
Feb
2025

What you can do to prevent workforce fraud

In this Help Net Security interview, Benjamin Racenberg, Senior Intelligence Services Manager at Nisos, discusses the threat of workforce fraud,…

8 steps to secure GenAI integration in financial services
04
Feb
2025

8 steps to secure GenAI integration in financial services

GenAI offers financial services institutions enormous opportunities, particularly in unstructured dataset analysis and management, but may also increase security risks,…

Qualys TotalAppSec enables organizations to address risks across web applications and APIs
03
Feb
2025

Qualys TotalAppSec enables organizations to address risks across web applications and APIs

Qualys announced TotalAppSec, its new AI-powered application risk management solution to enable organizations to monitor and mitigate cyber risk from…

DeepSeek's popularity exploited to push malicious packages via PyPI
03
Feb
2025

DeepSeek’s popularity exploited to push malicious packages via PyPI

Two malicious packages leveraging the DeepSeek name have been published to the Python Package Index (PyPI) package repository, and in…

The hidden dangers of a toxic cybersecurity workplace
03
Feb
2025

The hidden dangers of a toxic cybersecurity workplace

In this Help Net Security interview, Rob Lee, Chief of Research and Head of Faculty at SANS Institute, discusses what…

BadDNS: Open-source tool checks for subdomain takeovers
03
Feb
2025

BadDNS: Open-source tool checks for subdomain takeovers

BadDNS is an open-source Python DNS auditing tool designed to detect domain and subdomain takeovers of all types. BadDNS modules…

Only 3% of organizations have a dedicated budget for SaaS security
03
Feb
2025

Only 3% of organizations have a dedicated budget for SaaS security

Mid-market organizations are grappling with managing the large volume of SaaS applications, both sanctioned and unsanctioned, with actual numbers often…

How to use iCloud Private Relay for enhanced privacy
03
Feb
2025

How to use iCloud Private Relay for enhanced privacy

iCloud Private Relay, included with an iCloud+ subscription, enhances your privacy while browsing the web in Safari. When this feature…

Week in review: Apple 0-day used to target iPhones, DeepSeek’s popularity exploited by scammers
02
Feb
2025

Week in review: Apple 0-day used to target iPhones, DeepSeek’s popularity exploited by scammers

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Apple zero-day vulnerability exploited to…