Category: HelpnetSecurity

Apple releases iOS 18, with security and privacy improvements
17
Sep
2024

Apple releases iOS 18, with security and privacy improvements

Apple has launched iOS 18, the latest significant iteration of the operating system powering its iPhones. Along with many new…

F5 NGINX One improves app delivery and security functions
17
Sep
2024

F5 NGINX One improves app delivery and security functions

F5 launched F5 NGINX One, combining advanced load balancing, web and application server capabilities, API gateway functionalities, and security features…

PoC exploit for exploited Ivanti Cloud Services Appliance flaw released (CVE-2024-8190)
17
Sep
2024

PoC exploit for exploited Ivanti Cloud Services Appliance flaw released (CVE-2024-8190)

CVE-2024-8190, an OS command injection vulnerability in Ivanti Cloud Services Appliance (CSA) v4.6, is under active exploitation. Details about the…

Gcore WAAP protects websites, web applications, and APIs
17
Sep
2024

Gcore WAAP protects websites, web applications, and APIs

Gcore launched Gcore WAAP, its end-to-end web application and API protection solution. Leveraging AI capabilities, Gcore WAAP integrates four products…

Gateways to havoc: Overprivileged dormant service accounts
17
Sep
2024

Gateways to havoc: Overprivileged dormant service accounts

Service accounts are non-human identities used to automate machine-to-machine interactions. They support critical functions – such as running scripts, services,…

The growing danger of visual hacking and how to protect against it
17
Sep
2024

The growing danger of visual hacking and how to protect against it

In this Help Net Security interview, Robert Ramsey, CEO at Rain Technology, discusses the growing threat of visual hacking, how…

The cybersecurity workforce of the future requires diverse hiring practices
17
Sep
2024

The cybersecurity workforce of the future requires diverse hiring practices

The global cybersecurity workforce gap reached a new high with an estimated 4.8 million professionals needed to effectively secure organizations,…

The surge in cyber insurance and what it means for your business
16
Sep
2024

The surge in cyber insurance and what it means for your business

The cyber insurance market is set for explosive growth as organizations increasingly seek financial protection against rising cyber threats. This…

EchoStrike: Generate undetectable reverse shells, perform process injection
16
Sep
2024

EchoStrike: Generate undetectable reverse shells, perform process injection

EchoStrike is an open-source tool designed to generate undetectable reverse shells and execute process injection on Windows systems. “EchoStrike allows…

Compliance frameworks and GenAI: The Wild West of security standards
16
Sep
2024

Compliance frameworks and GenAI: The Wild West of security standards

In this Help Net Security interview, Kristian Kamber, CEO at SplxAI, discusses how security challenges for GenAI differ from traditional…

Trends and dangers in open-source software dependencies
16
Sep
2024

Trends and dangers in open-source software dependencies

A C-suite perspective on potential vulnerabilities within open-source dependencies or software packages reveals that, while remediation costs for dependency risks…

eBook: Navigating compliance with a security-first approach
16
Sep
2024

eBook: Navigating compliance with a security-first approach

As cyberattacks escalate, more regulations are being introduced to help protect organizations and their customers’ data. This has resulted in…