Category: HelpnetSecurity

Akira, LockBit actively searching for vulnerable Cisco ASA devices
08
Feb
2024

Akira, LockBit actively searching for vulnerable Cisco ASA devices

Akira and Lockbit ransomware groups are trying to breach Cisco ASA SSL VPN devices by exploiting several older vulnerabilities, security…

SOAPHound: Open-source tool to collect Active Directory data via ADWS
08
Feb
2024

SOAPHound: Open-source tool to collect Active Directory data via ADWS

SOAPHound is an open-source data collection tool capable of enumerating Active Directory environments through the Active Directory Web Services (ADWS)…

Choosing the right partner when outsourcing cybersecurity
08
Feb
2024

Choosing the right partner when outsourcing cybersecurity

In this Help Net Security interview, Anya Shpilman, Senior Executive, Cyber Security Services at WDigital, discusses the benefits and potential…

10 tips for creating your security hackathon playbook
08
Feb
2024

10 tips for creating your security hackathon playbook

For more than 12 years, I’ve been organizing and running hackathons with the goal of finding security vulnerabilities and fixing…

As-a-Service tools empower criminals with limited tech skills
08
Feb
2024

As-a-Service tools empower criminals with limited tech skills

As-a-service attacks continue to dominate the threat landscape, with Malware-as-a-Service (MaaS) and Ransomware-as-a-Service (RaaS) tools making up the majority of…

Qualys TotalCloud 2.0 measures cyber risk in cloud and SaaS apps
07
Feb
2024

Qualys TotalCloud 2.0 measures cyber risk in cloud and SaaS apps

Qualys unveiled TotalCloud 2.0. This significant upgrade to Qualys’ AI-powered cloud native application protection platform (CNAPP) delivers a single prioritized…

Chinese hackers breached Dutch Ministry of Defense
07
Feb
2024

Chinese hackers breached Dutch Ministry of Defense

Chinese state-sponsored hackers have breached the Dutch Ministry of Defense (MOD) last year and deployed a new remote access trojan…

The fight against commercial spyware misuse is heating up
07
Feb
2024

The fight against commercial spyware misuse is heating up

Though there are organizations out there investigating how commercial spyware is misused to target journalists, human rights defenders and dissidents,…

On-premises JetBrains TeamCity servers vulnerable to auth bypass (CVE-2024-23917)
07
Feb
2024

On-premises JetBrains TeamCity servers vulnerable to auth bypass (CVE-2024-23917)

JetBrains has patched a critical authentication bypass vulnerability (CVE-2024-23917) affecting TeamCity On-Premises continuous integration and deployment servers. About CVE-2024-23917 CVE-2024-23917…

Cybersecurity teams hesitate to use automation in TDIR workflows
07
Feb
2024

Cybersecurity teams hesitate to use automation in TDIR workflows

Despite reported threat detection, investigation, and response (TDIR) improvements in security operations, more than half of organizations still experienced significant…

Prowler: Open-source security tool for AWS, Google Cloud Platform, Azure
07
Feb
2024

Prowler: Open-source security tool for AWS, Google Cloud Platform, Azure

Prowler is an open-source security tool designed to assess, audit, and enhance the security of AWS, GCP, and Azure. It’s…

Common cloud security mistakes and how to avoid them
07
Feb
2024

Common cloud security mistakes and how to avoid them

According to recent surveys, 98% of organizations keep their financial, business, customer and/or employee information in the cloud but, at…