Category: HelpnetSecurity

Enhancing adversary simulations: Learn the business to attack the business
07
Feb
2024

Enhancing adversary simulations: Learn the business to attack the business

In this Help Net Security interview, Jamieson O’Reilly, Founder of DVULN, discusses adversary simulations, shedding light on challenges rooted in…

Spoutible API exposed encrypted password reset tokens, 2FA secrets of users
06
Feb
2024

Spoutible API exposed encrypted password reset tokens, 2FA secrets of users

A publicly exposed API of social media platform Spoutible may have allowed threat actors to scrape information that can be…

Cisco Motific reduces GenAI security, trust, and compliance risks
06
Feb
2024

Cisco Motific reduces GenAI security, trust, and compliance risks

Cisco announced Motific, Cisco’s SaaS product that allows for trustworthy GenAI deployments in organizations. Born from Outshift, Cisco’s incubation business,…

ResumeLooters target job search sites in extensive data heist
06
Feb
2024

ResumeLooters target job search sites in extensive data heist

Group-IB identified a large-scale malicious campaign primarily targeting job search and retail websites of companies in the Asia-Pacific region. The…

IBM LinuxONE 4 Express protects sensitive private data
06
Feb
2024

IBM LinuxONE 4 Express protects sensitive private data

IBM announced IBM LinuxONE 4 Express, extending the latest performance, security and AI capabilities of LinuxONE to small and medium…

Lagging Mastodon admins urged to patch critical account takeover flaw (CVE-2024-23832)
06
Feb
2024

Lagging Mastodon admins urged to patch critical account takeover flaw (CVE-2024-23832)

Five days after Mastodon developers pushed out fixes for a remotely exploitable account takeover vulnerability (CVE-2024-23832), over 66% of Mastodon…

Exploring NIST Cybersecurity Framework 2.0
06
Feb
2024

Exploring NIST Cybersecurity Framework 2.0

In this Help Net Security video, Dan Erel, VP of Security at SeeMetrics, discusses NIST Cybersecurity Framework (CSF) 2.0. NIST…

3 ways to achieve crypto agility in a post-quantum world
06
Feb
2024

3 ways to achieve crypto agility in a post-quantum world

Working at the speed of digital business is a constant challenge. But in today’s increasingly automated operational environment, crypto agility—i.e.,…

How CISOs navigate policies and access across enterprises
06
Feb
2024

How CISOs navigate policies and access across enterprises

In this Help Net Security interview, Marco Eggerling, Global CISO at Check Point, discusses the challenge of balancing data protection…

10 must-read cybersecurity books for 2024
06
Feb
2024

10 must-read cybersecurity books for 2024

Our list of cybersecurity books has been curated to steer your professional growth in 2024. This selection aims to provide…

Paying ransoms is becoming a cost of doing business for many
06
Feb
2024

Paying ransoms is becoming a cost of doing business for many

Today’s pervasive cyberattacks are forcing the majority of companies to pay ransoms and break their ‘do not pay’ policies, with…

Metomic for ChatGPT identifies critical risks in ChatGPT conversations
05
Feb
2024

Metomic for ChatGPT identifies critical risks in ChatGPT conversations

Metomic launched Metomic for ChatGPT, a technology that gives IT and security leaders full visibility into what sensitive data is…