Category: HelpnetSecurity

Open-source and free Android password managers that prioritize your privacy
19
Nov
2024

Open-source and free Android password managers that prioritize your privacy

We’re often told to use strong, unique passwords, especially for important accounts like email, banking, and social media. However, managing…

Attackers are exploiting 2 zero-days in Palo Alto Networks firewalls (CVE-2024-0012, CVE-2024-9474)
18
Nov
2024

Attackers are exploiting 2 zero-days in Palo Alto Networks firewalls (CVE-2024-0012, CVE-2024-9474)

Palo Alto Networks has released fixes for two vulnerabilities (CVE-2024-0012 and CVE-2024-9474) in its next-generation firewalls that have been exploited…

Major security audit of critical FreeBSD components now available
18
Nov
2024

Major security audit of critical FreeBSD components now available

The FreeBSD Foundation, in partnership with the Alpha-Omega Project, has released the results of an extensive security audit of two…

How and where to report cybercrime: What you need to know
18
Nov
2024

How and where to report cybercrime: What you need to know

Cybercrime reporting mechanisms vary across the globe, with each country offering different methods for citizens to report cybercrime, including online…

Transforming code scanning and threat detection with GenAI
18
Nov
2024

Transforming code scanning and threat detection with GenAI

In this Help Net Security interview, Stuart McClure, CEO of Qwiet AI, discusses the evolution of code scanning practices, highlighting…

Navigating the compliance labyrinth: A CSO’s guide to scaling security
18
Nov
2024

Navigating the compliance labyrinth: A CSO’s guide to scaling security

Imagine navigating a labyrinth where the walls constantly shift, and the path ahead is obscured by fog. If this brings…

Evaluating GRC tools - Help Net Security
18
Nov
2024

Evaluating GRC tools – Help Net Security

According to Gartner, the broad range of pricing for government, risk, and compliance (GRC) tools requires enterprise risk management (ERM)…

ScubaGear: Open-source tool to assess Microsoft 365 configurations for security gaps
18
Nov
2024

ScubaGear: Open-source tool to assess Microsoft 365 configurations for security gaps

ScubaGear is an open-source tool the Cybersecurity and Infrastructure Security Agency (CISA) created to automatically evaluate Microsoft 365 (M365) configurations…

Week in review: Microsoft patches actively exploited 0-days, Amazon and HSBC employee data leaked
17
Nov
2024

Week in review: Microsoft patches actively exploited 0-days, Amazon and HSBC employee data leaked

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft fixes actively exploited zero-days…

Cybercriminals hijack DNS to build stealth attack networks
15
Nov
2024

Cybercriminals hijack DNS to build stealth attack networks

Hijacking domains using a ‘Sitting Ducks attack’ remains an underrecognized topic in the cybersecurity community. Few threat researchers are familiar…

Cyber crooks push Android malware via letter
15
Nov
2024

Cyber crooks push Android malware via letter

Cyber crooks are trying out an interesting new approach for getting information-stealing malware installed on Android users’ smartphones: a physical…

Palo Alto Networks firewalls, Expedition under attack (CVE-2024-9463, CVE-2024-9465)
15
Nov
2024

Palo Alto Networks firewalls, Expedition under attack (CVE-2024-9463, CVE-2024-9465)

Attackers have been spotted exploiting two additional vulnerabilities (CVE-2024-9463, CVE-2024-9465) in Palo Alto Networks’ Expedition firewall configuration migration tool, CISA…