Category: HelpnetSecurity
New (down)loader malware called Latrodectus is being leveraged by initial access brokers and it looks like it might have been…
EJBCA is open-source PKI and CA software. It can handle almost anything, and someone once called it the kitchen sink…
Attackers are adept at identifying and exploiting the most cost-effective methods of compromise, highlighting the critical need for organizations to…
In this Help Net Security interview, Charlotte Wylie, SVP and Deputy CSO at Okta, discusses the challenges of managing user…
As the analysis of the backdoor in XZ Utils continues, several security companies have provided tools and advice on how…
Since it plays a vital role in every functioning society, the energy sector has always been a prime target for…
This month, we have a new product preview from Microsoft, and some older products are being prepared for end-of-support. But…
In this Help Net Security interview, Lynn Dohm, Executive Director at Women in CyberSecurity (WiCyS), talks about how the organization…
Organizations are leveraging zero trust to enhance the safety, security, and reliability of their enterprise across IT and OT environments,…
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Cyber attacks on critical infrastructure…
Disruptive technologies like AI are heightening the longstanding tension between organizational security and employee productivity, according to 1Password. Employees are…
Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of…











