Category: HelpnetSecurity

100+ domains seized to stymie Russian Star Blizzard hackers
04
Oct
2024

100+ domains seized to stymie Russian Star Blizzard hackers

Microsoft and the US Justice Department have seized over 100 domains used by Star Blizzard, a Russian nation-state threat actor….

MaLDAPtive: Open-source framework for LDAP SearchFilter parsing, obfuscation, and more!
04
Oct
2024

MaLDAPtive: Open-source framework for LDAP SearchFilter parsing, obfuscation, and more!

MaLDAPtive is an open-source framework for LDAP SearchFilter parsing, obfuscation, deobfuscation, and detection. At its core, the project features a…

October 2024 Patch Tuesday forecast: Recall can be recalled
04
Oct
2024

October 2024 Patch Tuesday forecast: Recall can be recalled

October arrived, and Microsoft started the month by announcing the release of Windows 11 24H2. The preview versions of this…

Best practices for implementing threat exposure management, reducing cyber risk exposure
04
Oct
2024

Best practices for implementing threat exposure management, reducing cyber risk exposure

In this Help Net Security interview, Sanaz Yashar, CEO at Zafran, discusses the role of threat exposure management (TEM) in…

Cybercriminals capitalize on poorly configured cloud environments
04
Oct
2024

Cybercriminals capitalize on poorly configured cloud environments

Off-the-shelf offensive security tools and poorly configured cloud environments create openings in the attack surface, according to Elastic. Adversaries are…

New infosec products of the week: October 4, 2024
04
Oct
2024

New infosec products of the week: October 4, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Balbix, Halcyon, Metomic, Red Sift,…

Critical Ivanti Endpoint Manager flaw exploited (CVE-2024-29824)
03
Oct
2024

Critical Ivanti Endpoint Manager flaw exploited (CVE-2024-29824)

CVE-2024-29824, an unauthenticated SQL Injection vulnerability in Ivanti Endpoint Manager (EPM) appliances, is being exploited by attackers, the Cybersecurity and…

CUPS vulnerabilities could be abused for DDoS attacks
03
Oct
2024

CUPS vulnerabilities could be abused for DDoS attacks

While the Common UNIX Printing System (CUPS) vulnerabilities recently disclosed by researcher Simone “evilsocket” Margaritelli are not easily exploited for…

Legit Posture Score empowers security teams to measure and manage their AppSec posture
03
Oct
2024

Legit Posture Score empowers security teams to measure and manage their AppSec posture

Legit Security launched its new “Legit Posture Score,” delivering a dynamic, comprehensive, and fully transparent ASPM rating system. Now security…

Private US companies targeted by Stonefly APT
03
Oct
2024

Private US companies targeted by Stonefly APT

Undeterred by the indictment issued against one of its alleged members, North Korean APT group Stonefly (aka APT45) continues to…

Whitepaper: Reach higher in your career with cloud security
03
Oct
2024

Whitepaper: Reach higher in your career with cloud security

The cybersecurity skills gap presents ongoing challenges worldwide, so organizations are scrambling to fill cloud security positions. Having a subject…

How to use the Apple Passwords app
03
Oct
2024

How to use the Apple Passwords app

The latest Apple OS updates (iOS 18, iPadOS 18, macOS Sequoia) have introduced a standalone Passwords app, to make users’…