Category: HelpnetSecurity

Strengthening security posture with comprehensive cybersecurity assessments
10
Dec
2024

Strengthening security posture with comprehensive cybersecurity assessments

In this Help Net Security interview, Phani Dasari, CISO at HGS, discusses key aspects of cybersecurity assessments, including effective tools…

Neosync: Open-source data anonymization, synthetic data orchestration
10
Dec
2024

Neosync: Open-source data anonymization, synthetic data orchestration

Neosync is an open-source, developer-centric solution designed to anonymize PII, generate synthetic data, and synchronize environments for improved testing and…

Update your OpenWrt router! Security issue made supply chain attack possible
09
Dec
2024

Update your OpenWrt router! Security issue made supply chain attack possible

A security issue that could have allowed attackers to serve malicious firmware images to users has been fixed by OpenWrt…

Microsoft: "Hack" this LLM-powered service and get paid
09
Dec
2024

Microsoft: “Hack” this LLM-powered service and get paid

Microsoft, in collaboration with the Institute of Science and Technology Australia and ETH Zurich, has announced the LLMail-Inject Challenge, a…

8Base hacked port operating company Luka Rijeka
09
Dec
2024

8Base hacked port operating company Luka Rijeka

Luka Rijeka, a company that offers maritime transport, port, storage of goods and forwarding services in Rijeka, Croatia, has been…

TPM 2.0: The new standard for secure firmware
09
Dec
2024

TPM 2.0: The new standard for secure firmware

Connected devices are better protected from cyberattacks and less likely to be compromised by errors thanks to the new TPM…

Who handles what? Common misconceptions about SaaS security responsibilities
09
Dec
2024

Who handles what? Common misconceptions about SaaS security responsibilities

In this Help Net Security interview, James Dolph, CISO at Guidewire, addresses common misconceptions about security responsibilities in cloud environments,…

Top cybersecurity books for your holiday gift list
09
Dec
2024

Top cybersecurity books for your holiday gift list

The holiday season is approaching, and with it, the tradition of gift-giving. For professionals and enthusiasts alike, a well-chosen book…

09
Dec
2024

Businesses plagued by constant stream of malicious emails

36.9% of all emails received by businesses (20.5 billion) in 2024 were unwanted, according to Hornetsecurity’s analysis of 55.6+ billion…

Week in review: Veeam Service Provider Console flaws fixed, Patch Tuesday forecast
08
Dec
2024

Week in review: Veeam Service Provider Console flaws fixed, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Veeam plugs serious holes in…

Resecurity introduces AI-powered GSOC at NATO Edge 2024
06
Dec
2024

Resecurity introduces AI-powered GSOC at NATO Edge 2024

Resecurity, a global leader in cybersecurity solutions, unveiled its advanced Government Security Operations Center (GSOC) during NATO Edge 2024, the…

Windows, macOS users targeted with crypto-and-info-stealing malware
06
Dec
2024

Windows, macOS users targeted with crypto-and-info-stealing malware

Downloading anything from the internet is a gamble these days: you might think that you are downloading an innocuous app…