Category: HelpnetSecurity

Appdome launches MobileEDR, merging MTD and EDR to protect enterprise mobile apps
02
May
2024

Appdome launches MobileEDR, merging MTD and EDR to protect enterprise mobile apps

Appdome has released Appdome MobileEDR, a new enterprise mobile app protection service that consolidates Mobile Threat Defense (MTD) and Endpoint…

Dropbox says attackers accessed customer and MFA info, API keys
02
May
2024

Dropbox says attackers accessed customer and MFA info, API keys

File hosting service Dropbox has confirmed that attackers have breached the Dropbox Sign production environment and accessed customer personal and…

AI-driven phishing attacks deceive even the most aware users
02
May
2024

AI-driven phishing attacks deceive even the most aware users

Vishing and deepfake phishing attacks are on the rise as attackers leverage GenAI to amplify social engineering tactics, according to…

Understanding emerging AI and data privacy regulations
02
May
2024

Understanding emerging AI and data privacy regulations

In this Help Net Security interview, Sophie Stalla-Bourdillon, Senior Privacy Counsel & Legal Engineer at Immuta, discusses the AI Act,…

2024 Data Breach Investigations Report: Most breaches involve a non-malicious human element
02
May
2024

2024 Data Breach Investigations Report: Most breaches involve a non-malicious human element

The exploitation of vulnerabilities as an initial point of entry almost tripled from the previous year, accounting for 14% of…

Securing your organization's supply chain: Reducing the risks of third parties
02
May
2024

Securing your organization’s supply chain: Reducing the risks of third parties

When Stephen Hawking said that “we are all now connected by the internet, like neurons in a giant brain”, very…

reNgine: Open-source automated reconnaissance framework for web applications
02
May
2024

reNgine: Open-source automated reconnaissance framework for web applications

reNgine is an open-source automated reconnaissance framework for web applications that focuses on a highly configurable and streamlined recon process….

Women rising in cybersecurity roles, but roadblocks remain
02
May
2024

Women rising in cybersecurity roles, but roadblocks remain

The ISC2 study on women in cybersecurity, a comprehensive research effort that collected responses from 2,400 women, has revealed several…

Making cybersecurity more appealing to women, closing the skills gap
01
May
2024

Making cybersecurity more appealing to women, closing the skills gap

In this Help Net Security interview, Charly Davis, CCO at Sapphire, provides insights into the current challenges and barriers women…

Why cloud vulnerabilities need CVEs
01
May
2024

Why cloud vulnerabilities need CVEs

When considering vulnerability management’s purpose in a modern world, it’s imperative to recognize the huge transition to new technologies and…

Cybersecurity jobs available right now: May 1, 2024
01
May
2024

Cybersecurity jobs available right now: May 1, 2024

Adversary Simulation Specialist LyondellBasell | Poland | On-site – View job details The Adversary Simulation Specialist will be responsible for…

Essential steps for zero-trust strategy implementation
01
May
2024

Essential steps for zero-trust strategy implementation

63% of organizations worldwide have fully or partially implemented a zero-trust strategy, according to Gartner. For 78% of organizations implementing…