Category: HelpnetSecurity

Misconfig Mapper: Open-source tool to uncover security misconfigurations
24
Feb
2025

Misconfig Mapper: Open-source tool to uncover security misconfigurations

Misconfig Mapper is an open-source CLI tool built in Golang that discovers and enumerates instances of services used within your…

Week in review: PostgreSQL 0-day exploited in US Treasury hack, top OSINT books to learn from
23
Feb
2025

Week in review: PostgreSQL 0-day exploited in US Treasury hack, top OSINT books to learn from

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: A PostgreSQL zero-day was also…

Security and privacy concerns challenge public sector's efforts to modernize
21
Feb
2025

Security and privacy concerns challenge public sector’s efforts to modernize

For most public sector organizations, digital transformation is a work in progress, with the complexity of integrating new systems and…

Mastering the cybersecurity tightrope of protection, detection, and response
21
Feb
2025

Mastering the cybersecurity tightrope of protection, detection, and response

In this Help Net Security interview, Chester Wisniewski, Director and Global Field CISO at Sophos, discusses the shifting ransomware landscape,…

How to secure Notes on iOS and macOS
21
Feb
2025

How to secure Notes on iOS and macOS

Apple allows you to lock your notes using your iPhone passcode or a separate password, ensuring your private information stays…

New infosec products of the week: February 21, 2025
21
Feb
2025

New infosec products of the week: February 21, 2025

Here’s a look at the most interesting products from the past week, featuring releases from 1Password, Fortinet, Pangea, Privacera, and…

Cybersecurity jobs available right now in the USA: February 20, 2025
20
Feb
2025

Cybersecurity jobs available right now in the USA: February 20, 2025

Compliance & Privacy Specialist McKesson | Remote – View job details As a Compliance & Privacy Specialist, you will identify…

PRevent: Open-source tool to detect malicious code in pull requests
20
Feb
2025

PRevent: Open-source tool to detect malicious code in pull requests

Apiiro security researchers have released open source tools that can help organizations detect malicious code as part of their software…

Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
20
Feb
2025

Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand

A new, improved version of Darcula, a cat-themed phishing-as-a-service (PhaaS) platform aimed at serving Chinese-speaking criminals, will be released this…

Hackers pose as employers to steal crypto, login credentials
20
Feb
2025

Hackers pose as employers to steal crypto, login credentials

Since early 2024, ESET researchers have been tracking DeceptiveDevelopment, a series of malicious campaigns linked to North Korea-aligned operators. Disguising…

Norton's AI-powered features defend against scams and social engineering threats
20
Feb
2025

Norton’s AI-powered features defend against scams and social engineering threats

Norton is setting the standard for scam protection with a new range of AI-powered features fully integrated in Norton Cyber…

Privacera enables enterprises to identify, assess, and remediate AI-related risks
20
Feb
2025

Privacera enables enterprises to identify, assess, and remediate AI-related risks

Privacera announced significant updates to its AI Governance (PAIG) platform, reinforcing its commitment to AI risk management and compliance. These…