Category: HelpnetSecurity

Atakama introduces DNS filtering designed for MSPs
06
Nov
2024

Atakama introduces DNS filtering designed for MSPs

Atakama announced the latest expansion of its Managed Browser Security Platform, introducing DNS filtering explicitly designed for Managed Service Providers…

GoZone ransomware accuses and threatens victims
06
Nov
2024

GoZone ransomware accuses and threatens victims

A new ransomware dubbed GoZone is being leveraged by attackers that don’t seem to be very greedy: they are asking…

Authlete 3.0 empowers organizations to improve how they issue and manage user credentials
06
Nov
2024

Authlete 3.0 empowers organizations to improve how they issue and manage user credentials

Authlete launched Authlete 3.0, offering support for OpenID for Verifiable Credential Issuance (OID4VCI). This new capability empowers organizations—including governments, financial…

Symbiotic provides developers with real-time feedback on potential security vulnerabilities
06
Nov
2024

Symbiotic provides developers with real-time feedback on potential security vulnerabilities

Symbiotic Security launched a real-time security for software development that combines detection and remediation with just-in-time training – incorporating security…

Osmedeus: Open-source workflow engine for offensive security
06
Nov
2024

Osmedeus: Open-source workflow engine for offensive security

Osmedeus is an open-source workflow engine designed for offensive security. It serves as a versatile foundation, enabling users to easily…

The cybersecurity gender gap: How diverse teams improve threat response
06
Nov
2024

The cybersecurity gender gap: How diverse teams improve threat response

In this Help Net Security interview, Julie Madhusoodanan, Head of CyberSecurity at LinkedIn, discusses how closing the gender gap could…

Identity-related data breaches cost more than average incidents
06
Nov
2024

Identity-related data breaches cost more than average incidents

Identity-related data breaches are more severe and costly than run-of-the-mill incidents, according to RSA. 40% of respondents reported an identity-related…

Beware of phishing emails delivering backdoored Linux VMs!
05
Nov
2024

Beware of phishing emails delivering backdoored Linux VMs!

Unknown attackers are trying to trick Windows users into spinning up a custom Linux virtual machine (VM) with a pre-configured…

Google patches actively exploited Android vulnerability (CVE-2024-43093)
05
Nov
2024

Google patches actively exploited Android vulnerability (CVE-2024-43093)

Google has delivered fixes for two vulnerabilities endangering Android users that “may be under limited, targeted exploitation”: CVE-2024-43047, a flaw…

Report: Voice of Practitioners 2024 - The True State of Secrets Security
05
Nov
2024

Report: Voice of Practitioners 2024 – The True State of Secrets Security

In this study, GitGuardian and CyberArk reveal the stark reality of secrets management across 1,000 organizations. With 79% experiencing secrets…

AI learning mechanisms may lead to increase in codebase leaks
05
Nov
2024

AI learning mechanisms may lead to increase in codebase leaks

The proliferation of non-human identities and the complexity of modern application architectures has created significant security challenges, particularly in managing…

Open-source software: A first attempt at organization after CRA
05
Nov
2024

Open-source software: A first attempt at organization after CRA

The open-source software (OSS) industry is developing the core software for the global infrastructure, to the point that even some…