Category: HelpnetSecurity

13
Jun
2025

StackHawk Sensitive Data Identification provides visibility into high-risk APIs

StackHawk announced Sensitive Data Identification to give security teams visibility into high-risk APIs across thousands of code repositories within an…

13
Jun
2025

New infosec products of the week: June 13, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Contrast Security, Cymulate, Lemony, SpecterOps,…

13
Jun
2025

What CISOs need to know about agentic AI

GenAI has been the star of the show lately. Tools like ChatGPT impressed everyone with how well they can summarize,…

13
Jun
2025

Unpacking the security complexity of no-code development platforms

In this Help Net Security interview, Amichai Shulman, CTO at Nokod Security, discusses how the abstraction layer in no-code environments…

13
Jun
2025

Security flaws in government apps go unpatched for years

78% of public sector organizations are operating with significant security debt, flaws left unaddressed for more than a year, according…

13
Jun
2025

19 ways to build zero trust: NIST offers practical implementation guide

The National Institute of Standards and Technology (NIST) has released a new guide that offers practical help for building zero…

12
Jun
2025

Researchers warn of ongoing Entra ID account takeover campaign

Attackers are using the TeamFiltration pentesting framework to brute-force their way into Microsoft Entra ID (formerly Azure AD) accounts, Proofpoint…

12
Jun
2025

LockBit panel data leak shows Chinese orgs among the most targeted

The LockBit ransomware-as-a-service (RaaS) operation has netted around $2.3 million USD within 5 months, the data leak stemming from the…

12
Jun
2025

Identifying high-risk APIs across thousands of code repositories

In this Help Net Security interview, Joni Klippert, CEO of StackHawk, discusses why API visibility is a major blind spot…

12
Jun
2025

Lemony mitigates privacy and compliance risks associated with cloud-based AI

Lemony announced its on-premise artificial intelligence solution that is redefining how organizations deploy generative AI. Lemony’s secure, hardware-based node offers…

12
Jun
2025

Build a mobile hacking rig with a Pixel and Kali NetHunter

A cybersecurity hobbyist has built a compact, foldable mobile hacking rig that runs Kali NetHunter on a Google Pixel 3…

12
Jun
2025

Cybercriminals are turning stolen data into a thriving black market

Cybercriminals are stealing data and running full-scale businesses around it. Europol’s latest Internet Organised Crime Threat Assessment (IOCTA) report reveals…