Category: HelpnetSecurity

The power of passive OS fingerprinting for accurate IoT device identification
31
Aug
2023

The power of passive OS fingerprinting for accurate IoT device identification

The number of IoT devices in enterprise networks and across the internet is projected to reach 29 billion by the…

What does optimal software security analysis look like?
31
Aug
2023

What does optimal software security analysis look like?

In this Help Net Security interview, Kevin Valk, co-CEO at Codean, discusses the consequences of relying solely on automated tools…

The secret habits of top-performing CISOs
31
Aug
2023

The secret habits of top-performing CISOs

69% of top-performing CISOs dedicate recurring time on their calendars for personal professional development, according to Gartner. This is compared…

ComplyCube Field Redaction removes sensitive fields from documents
30
Aug
2023

ComplyCube Field Redaction removes sensitive fields from documents

ComplyCube enhanced its Document Checks solution with automated Field Redaction capabilities. This feature systematically masks sensitive Personal Identifiable Information (PII)…

The removal of Qakbot from infected computers is just the first step
30
Aug
2023

The removal of Qakbot from infected computers is just the first step

The Qakbot botnet has been disrupted by an international law enforcement operation that culminated last weekend, when infected computers started…

Google launches tool to identify AI-generated images
30
Aug
2023

Google launches tool to identify AI-generated images

Google is launching a beta version of SynthID, a tool that identifies and watermarks AI-generated images. The tool will initially…

Is the new OWASP API Top 10 helpful to defenders?
30
Aug
2023

Is the new OWASP API Top 10 helpful to defenders?

The OWASP Foundation’s Top Ten lists have helped defenders focus their efforts with respect to specific technologies and the OWASP…

Rising cyber incidents challenge healthcare organizations
30
Aug
2023

Rising cyber incidents challenge healthcare organizations

Healthcare organizations are facing many cybersecurity challenges that require them to increasingly prioritize cybersecurity and compliance, according to Claroty. Threat…

Velociraptor: Open-source digital forensics and incident response
30
Aug
2023

Velociraptor: Open-source digital forensics and incident response

Velociraptor is a sophisticated digital forensics and incident response tool designed to improve your insight into endpoint activities. Velociraptor enables…

Qakbot botnet disrupted, malware removed from 700,000+ victim computers
29
Aug
2023

Qakbot botnet disrupted, malware removed from 700,000+ victim computers

The Qakbot botnet has been crippled by the US Department of Justice (DOJ): 52 of its servers have been seized…

Ransomware group exploits Citrix NetScaler systems for initial access
29
Aug
2023

Ransomware group exploits Citrix NetScaler systems for initial access

A known threat actor specializing in ransomware attacks is believed to be behind a recent campaign that targeted unpatched internet-facing…

Easy-to-exploit Skype vulnerability reveals users' IP address
29
Aug
2023

Easy-to-exploit Skype vulnerability reveals users’ IP address

A vulnerability in Skype mobile apps can be exploited by attackers to discover a user’s IP address – a piece…