Category: HelpnetSecurity

New Latrodectus loader steps in for Qbot
09
Apr
2024

New Latrodectus loader steps in for Qbot

New (down)loader malware called Latrodectus is being leveraged by initial access brokers and it looks like it might have been…

EJBCA: Open-source public key infrastructure (PKI), certificate authority (CA)
09
Apr
2024

EJBCA: Open-source public key infrastructure (PKI), certificate authority (CA)

EJBCA is open-source PKI and CA software. It can handle almost anything, and someone once called it the kitchen sink…

How exposure management elevates cyber resilience
09
Apr
2024

How exposure management elevates cyber resilience

Attackers are adept at identifying and exploiting the most cost-effective methods of compromise, highlighting the critical need for organizations to…

Strategies for secure identity management in hybrid environments
09
Apr
2024

Strategies for secure identity management in hybrid environments

In this Help Net Security interview, Charlotte Wylie, SVP and Deputy CSO at Okta, discusses the challenges of managing user…

XZ Utils backdoor: Detection tools, scripts, rules
08
Apr
2024

XZ Utils backdoor: Detection tools, scripts, rules

As the analysis of the backdoor in XZ Utils continues, several security companies have provided tools and advice on how…

How can the energy sector bolster its resilience to ransomware attacks?
08
Apr
2024

How can the energy sector bolster its resilience to ransomware attacks?

Since it plays a vital role in every functioning society, the energy sector has always been a prime target for…

April 2024 Patch Tuesday forecast: New and old from Microsoft
08
Apr
2024

April 2024 Patch Tuesday forecast: New and old from Microsoft

This month, we have a new product preview from Microsoft, and some older products are being prepared for end-of-support. But…

WiCyS: A champion for a more diverse cybersecurity workforce
08
Apr
2024

WiCyS: A champion for a more diverse cybersecurity workforce

In this Help Net Security interview, Lynn Dohm, Executive Director at Women in CyberSecurity (WiCyS), talks about how the organization…

Industrial sectors embrace zero trust for enhanced security
08
Apr
2024

Industrial sectors embrace zero trust for enhanced security

Organizations are leveraging zero trust to enhance the safety, security, and reliability of their enterprise across IT and OT environments,…

Week in review: 73M customers affected by AT&T data leak, errors led to US govt inboxes compromise
07
Apr
2024

Week in review: 73M customers affected by AT&T data leak, errors led to US govt inboxes compromise

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Cyber attacks on critical infrastructure…

22% of employees admit to breaching company rules with GenAI
05
Apr
2024

22% of employees admit to breaching company rules with GenAI

Disruptive technologies like AI are heightening the longstanding tension between organizational security and employee productivity, according to 1Password. Employees are…

Cybercriminal adoption of browser fingerprinting
05
Apr
2024

Cybercriminal adoption of browser fingerprinting

Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of…