Category: HelpnetSecurity

Cybercriminals exploit file sharing services to advance phishing attacks
20
Aug
2024

Cybercriminals exploit file sharing services to advance phishing attacks

Threat actors use popular file-hosting or e-signature solutions as a disguise to manipulate their targets into revealing private information or…

Strategies for security leaders: Building a positive cybersecurity culture
20
Aug
2024

Strategies for security leaders: Building a positive cybersecurity culture

Culture is a catalyst for security success. It can significantly reduce cybersecurity risks and boost cybersecurity resilience of any organization….

AI for application security: Balancing automation with human oversight
20
Aug
2024

AI for application security: Balancing automation with human oversight

In this Help Net Security interview, Kyle Wickert, Worldwide Strategic Architect at AlgoSec, discusses the role of AI in application…

Organizations turn to biometrics to counter deepfakes
20
Aug
2024

Organizations turn to biometrics to counter deepfakes

The risk of deepfakes is rising with 47% of organizations having encountered a deepfake and 70% of them believing deepfake…

Stolen, locked payment cards can be used with digital wallet apps
19
Aug
2024

Stolen, locked payment cards can be used with digital wallet apps

Fraudsters can add stolen payment cards to digital wallet apps and continue making online purchases even after victims’ report the…

Own proactively detects and stores data changes in Salesforce
19
Aug
2024

Own proactively detects and stores data changes in Salesforce

Own released Continuous Data Protection for Salesforce customers, further strengthening its product offering to include recovery and analysis capabilities. Own…

To improve your cybersecurity posture, focus on the data
19
Aug
2024

To improve your cybersecurity posture, focus on the data

Effectively converging, managing and using enterprise data is a huge undertaking. Enterprises have vast hoards of data, but those hoards…

x64dbg: Open-source binary debugger for Windows
19
Aug
2024

x64dbg: Open-source binary debugger for Windows

x64dbg is an open-source binary debugger for Windows, designed for malware analysis and reverse engineering of executables without access to…

Common API security issues: From exposed secrets to unauthorized access
19
Aug
2024

Common API security issues: From exposed secrets to unauthorized access

Despite their role in connecting applications and driving innovation, APIs often suffer from serious security vulnerabilities. Recent investigations reveal that…

Week in review: MS Office flaw may leak NTLM hashes, malicious Chrome, Edge browser extensions
18
Aug
2024

Week in review: MS Office flaw may leak NTLM hashes, malicious Chrome, Edge browser extensions

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Unpatched MS Office flaw may…

Tech support scammers impersonate Google via malicious search ads
16
Aug
2024

Tech support scammers impersonate Google via malicious search ads

Google Search ads that target users looking for Google’s own services lead them to spoofed sites and Microsoft and Apple…

Observations from Black Hat USA 2024, BSidesLV, and DEF CON 32
16
Aug
2024

Observations from Black Hat USA 2024, BSidesLV, and DEF CON 32

I recently spent six days in Las Vegas attending DEF CON, BsidesLV, and Black Hat USA 2024, where I had…