Category: HelpnetSecurity

Ransomware statistics that reveal alarming rate of cyber extortion
15
May
2024

Ransomware statistics that reveal alarming rate of cyber extortion

In this article, you will find excerpts from various reports that offer statistics and insights about the current ransomware landscape….

Core security measures to strengthen privacy and data protection programs
15
May
2024

Core security measures to strengthen privacy and data protection programs

As privacy laws evolve globally, organizations face increasing complexity in adapting their data protection strategies to stay compliant. In this…

Cybersecurity jobs available right now: May 15, 2024
15
May
2024

Cybersecurity jobs available right now: May 15, 2024

Associate / Pentester (Red Team) – Cybersecurity Audit Siemens | Germany | Hybrid – View job details As an Associate…

Cybersecurity analysis exposes high-risk assets in power and healthcare sectors
15
May
2024

Cybersecurity analysis exposes high-risk assets in power and healthcare sectors

Traditional approaches to vulnerability management result in a narrow focus of the enterprise attack surface area that overlooks a considerable…

May 2024 Patch Tuesday: Microsoft fixes exploited zero-days (CVE-2024-30051, CVE-2024-30040)
14
May
2024

May 2024 Patch Tuesday: Microsoft fixes exploited zero-days (CVE-2024-30051, CVE-2024-30040)

For May 2024 Patch Tuesday, Microsoft has released fixes for 59 CVE-numbered vulnerabilities, including two zero-days (CVE-2024-30051, CVE-2024-30040) actively exploited…

BLint: Open-source tool to check the security properties of your executables
14
May
2024

BLint: Open-source tool to check the security properties of your executables

BLint is a Binary Linter designed to evaluate your executables’ security properties and capabilities, utilizing LIEF for its operations. From…

How a GRC consultant passed the CISSP exam in six weeks
14
May
2024

How a GRC consultant passed the CISSP exam in six weeks

Ask any IT security professional which certification they would consider to be the “gold standard” in terms of prestige, credibility,…

Tailoring responsible AI: Defining ethical guidelines for industry-specific use
14
May
2024

Tailoring responsible AI: Defining ethical guidelines for industry-specific use

In this Help Net Security interview, Chris Peake, CISO & SVP at Smartsheet, explains how responsible AI should be defined…

Log4J shows no sign of fading, spotted in 30% of CVE exploits
14
May
2024

Log4J shows no sign of fading, spotted in 30% of CVE exploits

Organizations continue to run insecure protocols across their wide access networks (WAN), making it easier for cybercriminals to move across…

MITRE EMB3D improves security for embedded devices
13
May
2024

MITRE EMB3D improves security for embedded devices

MITRE released EMB3D, a cybersecurity threat model for embedded devices. The model provides a cultivated knowledge base of cyber threats…

Establishing a security baseline for open source projects
13
May
2024

Establishing a security baseline for open source projects

In this Help Net Security interview, Dana Wang, Chief Architect at OpenSSF, discusses the most significant barriers to improving open-source…

Red teaming: The key ingredient for responsible AI
13
May
2024

Red teaming: The key ingredient for responsible AI

Developing responsible AI isn’t a straightforward proposition. On one side, organizations are striving to stay at the forefront of technological…