Category: HelpnetSecurity

What makes a good ASM solution stand out
29
Aug
2023

What makes a good ASM solution stand out

In this Help Net Security interview, Patrice Auffret, CTO at Onyphe, explains how the traditional perimeter-based security view is becoming…

Is the cybersecurity community’s obsession with compliance counter-productive?
29
Aug
2023

Is the cybersecurity community’s obsession with compliance counter-productive?

Does anyone think the chances of surviving a plane crash increase if our tray tables are locked and our carry-on…

11 search engines for cybersecurity research you can use right now
29
Aug
2023

11 search engines for cybersecurity research you can use right now

Staying ahead in cybersecurity requires constant learning and adaptation. If you’re interested in cybersecurity research, explore the resources outlined below….

IT leaders alarmed by generative AI's SaaS security implications
29
Aug
2023

IT leaders alarmed by generative AI’s SaaS security implications

IT leaders are grappling with anxiety over the risks of generative AI despite continued confidence in their software-as-a-service (SaaS) security…

Kroll SIM-swap attack: FTX, BlockFi and Genesis clients' info exposed
28
Aug
2023

Kroll SIM-swap attack: FTX, BlockFi and Genesis clients’ info exposed

Financial and risk advisory firm Kroll has suffered a SIM-swapping attack that allowed a threat actor to access files containing…

PoC for no-auth RCE on Juniper firewalls released
28
Aug
2023

PoC for no-auth RCE on Juniper firewalls released

Researchers have released additional details about the recently patched four vulnerabilities affecting Juniper Networks’ SRX firewalls and EX switches that…

Uncovering a privacy-preserving approach to machine learning
28
Aug
2023

Uncovering a privacy-preserving approach to machine learning

In the era of data-driven decision making, businesses are harnessing the power of machine learning (ML) to unlock valuable insights,…

Adapting authentication to a cloud-centric landscape
28
Aug
2023

Adapting authentication to a cloud-centric landscape

In this Help Net Security interview, Florian Forster, CEO at Zitadel, discusses the challenges CISOs face in managing authentication across…

Customizing LLMs for domain-specific tasks
28
Aug
2023

Customizing LLMs for domain-specific tasks

The expansion of large language models (LLMs) in recent times has brought about a revolutionary change in machine learning processes…

Experts demand clarity as they struggle with cloud security prioritization
28
Aug
2023

Experts demand clarity as they struggle with cloud security prioritization

Cloud Native Application Protection Platforms (CNAPPs) have emerged as a critical category of security tooling in recent years due to…

Week in review: Security Onion 2.4 released, WinRAR vulnerable to RCE
27
Aug
2023

Week in review: Security Onion 2.4 released, WinRAR vulnerable to RCE

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Network detection and response in…

Lazarus Group exploited ManageEngine vulnerability to target critical infrastructure
25
Aug
2023

Lazarus Group exploited ManageEngine vulnerability to target critical infrastructure

North Korean state-sponsored hackers Lazarus Group have been exploiting a ManageEngine ServiceDesk vulnerability (CVE-2022-47966) to target internet backbone infrastructure and…