Category: HelpnetSecurity

01
Sep
2023

Exploring the traits of effective chief audit executives

Chief audit executives (CAEs) have identified risk orientation, stakeholder management, and team leadership as the top three characteristics of the…

31
Aug
2023

Cisco VPNs without MFA enabled hit by ransomware groups

Since March 2023 (and possibly even earlier), affiliates of the Akira and LockBit ransomware operators have been breaching organizations via…

31
Aug
2023

Trojanized Signal, Telegram apps found on Google Play, Samsung Galaxy Store

ESET researchers have identified two active campaigns targeting Android users, where the threat actors behind the tools for Telegram and…

31
Aug
2023

The power of passive OS fingerprinting for accurate IoT device identification

The number of IoT devices in enterprise networks and across the internet is projected to reach 29 billion by the…

31
Aug
2023

What does optimal software security analysis look like?

In this Help Net Security interview, Kevin Valk, co-CEO at Codean, discusses the consequences of relying solely on automated tools…

31
Aug
2023

The secret habits of top-performing CISOs

69% of top-performing CISOs dedicate recurring time on their calendars for personal professional development, according to Gartner. This is compared…

30
Aug
2023

ComplyCube Field Redaction removes sensitive fields from documents

ComplyCube enhanced its Document Checks solution with automated Field Redaction capabilities. This feature systematically masks sensitive Personal Identifiable Information (PII)…

30
Aug
2023

The removal of Qakbot from infected computers is just the first step

The Qakbot botnet has been disrupted by an international law enforcement operation that culminated last weekend, when infected computers started…

30
Aug
2023

Google launches tool to identify AI-generated images

Google is launching a beta version of SynthID, a tool that identifies and watermarks AI-generated images. The tool will initially…

30
Aug
2023

Is the new OWASP API Top 10 helpful to defenders?

The OWASP Foundation’s Top Ten lists have helped defenders focus their efforts with respect to specific technologies and the OWASP…

30
Aug
2023

Rising cyber incidents challenge healthcare organizations

Healthcare organizations are facing many cybersecurity challenges that require them to increasingly prioritize cybersecurity and compliance, according to Claroty. Threat…

30
Aug
2023

Velociraptor: Open-source digital forensics and incident response

Velociraptor is a sophisticated digital forensics and incident response tool designed to improve your insight into endpoint activities. Velociraptor enables…