Category: HelpnetSecurity

Compliance budgets under strain as inflation and workload grow
06
Sep
2023

Compliance budgets under strain as inflation and workload grow

Compliance leaders are facing pressure to make the most of existing resources despite economic challenges and increased workload volume and…

Avoidable digital certificate issues fuel data breaches
06
Sep
2023

Avoidable digital certificate issues fuel data breaches

Among organizations that have suffered data breaches 58% were caused by issues related to digital certificates, according to a report…

Reflectiz offers remote solution to battle Magecart attacks
05
Sep
2023

Reflectiz offers remote solution to battle Magecart attacks

Reflectiz, a cybersecurity company specializing in continuous web threat management, offers a remote solution to battle Magecart web-skimming attacks, a…

Atlas VPN zero-day allows sites to discover users' IP address
05
Sep
2023

Atlas VPN zero-day allows sites to discover users’ IP address

Atlas VPN has confirmed the existence of a zero-day vulnerability that may allow website owners to discover Linux users’ real…

Hornetsecurity releases 365 Total Protection Plan 4 for Microsoft 365 to protect email communications
05
Sep
2023

Hornetsecurity releases 365 Total Protection Plan 4 for Microsoft 365 to protect email communications

Hornetsecurity has launched its Plan 4 “Compliance & Awareness” solution of 365 Total Protection Suite, offering a higher level of…

LockBit leaks sensitive data from maximum security fence manufacturer
05
Sep
2023

LockBit leaks sensitive data from maximum security fence manufacturer

The LockBit ransomware group has breached Zaun, a UK-based manufacturer of fencing systems for military sites and critical utilities, by…

The misconceptions preventing wider adoption of digital signatures
05
Sep
2023

The misconceptions preventing wider adoption of digital signatures

In this Help Net Security interview, Thorsten Hau, CEO at fidentity, discusses the legal validity of qualified digital signatures, demonstrating…

Connected cars and cybercrime: A primer
05
Sep
2023

Connected cars and cybercrime: A primer

Original equipment suppliers (OEMs) and their suppliers who are weighing how to invest their budgets might be inclined to slow…

Reaper: Open-source reconnaissance and attack proxy workflow automation
05
Sep
2023

Reaper: Open-source reconnaissance and attack proxy workflow automation

Reaper is an open-source reconnaissance and attack proxy, built to be a modern, lightweight, and efficient equivalent to Burp Suite/ZAP….

6 free resources for getting started in cybersecurity
05
Sep
2023

6 free resources for getting started in cybersecurity

Cybersecurity is not just a career field on the rise – it’s a calling that’s increasingly vital to the infrastructure…

Infosec products of the month: August 2023
04
Sep
2023

Infosec products of the month: August 2023

Here’s a look at the most interesting products from the past month, featuring releases from: Action1, Adaptive Shield, Bitdefender, Bitwarden,…

Ransomware attacks go beyond just data
04
Sep
2023

Ransomware attacks go beyond just data

65% of organizations confirmed that ransomware is one of the top three threats to their viability, and for 13%, it…