Category: HelpnetSecurity

03
May
2023

5 API security best practices you must implement

As outside economic pressures continue to shape how organizations think and allocate resources, data security continues to be a high…

03
May
2023

Tython: Open-source Security as Code framework and SDK

Development teams utilize automation through Infrastructure as Code (IaC) to facilitate rapid and frequent changes to their cloud-native architectures. Security…

03
May
2023

Security in the cloud with more automation

Hopefully, you’ve been working with the Center for Internet Security (CIS) on securing your cloud infrastructure for a while now….

02
May
2023

Easily exploitable flaw in Oracle Opera could spell trouble for hotel chains (CVE-2023-21932)

A recently patched vulnerability (CVE-2023-21932) in Oracle Opera, a property management system widely used in large hotel and resort chains,…

02
May
2023

Infostealer with hVNC capability pushed via Google Ads

There has been a noted increase in malvertising via Google Ads this year, aimed at tricking users into downloading malware;…

02
May
2023

Apple starts delivering smaller security updates

The security updating of iPhones, iPads and Macs has entered a new stage: Apple has, for the first time, released…

02
May
2023

Data-driven insights help prevent decisions based on fear

Organizations have strengthened security measures and become more resilient, but threat actors are still finding ways through, according to BakerHostetler….

02
May
2023

The costly threat that many businesses fail to address

Insider attacks such as fraud, sabotage, and data theft plague 71% of U.S. businesses, according to Capterra. These schemes can…

02
May
2023

The warning signs for security analyst burnout and ways to prevent

Security analysts face the demanding task of investigating and resolving increasing volumes of alerts daily, while adapting to an ever-changing…

02
May
2023

Why the manufacturing sector needs stronger cyber defenses

In this Help Net Security interview, Filipe Beato, Lead, Centre for Cybersecurity, World Economic Forum, shares his expertise on the…

01
May
2023

Using just-in-time access to reduce cloud security risk

Excessive privileges are a continuing headache for security professionals. As more organizations migrate assets to the cloud, users with excessive…

01
May
2023

Cybercriminals use proxies to legitimize fraudulent requests

Bot attacks were previously seen as relatively inconsequential type of online fraud, and that mentality has persisted even as threat…