Category: HelpnetSecurity

eBook: The Art & Science of Secure Software Development
18
Jun
2024

eBook: The Art & Science of Secure Software Development

Software security requires a creative and disciplined approach. It involves having the vision to develop secure strategy, tactics, and execution….

Datadog App Builder helps accelerate issue remediation
18
Jun
2024

Datadog App Builder helps accelerate issue remediation

Datadog launched Datadog App Builder, a low-code development tool that helps teams create self-service applications and integrate them securely into…

How to create your cybersecurity "Google Maps": A step-by-step guide for security teams
18
Jun
2024

How to create your cybersecurity “Google Maps”: A step-by-step guide for security teams

Cybersecurity isn’t just about firewalls and antivirus. It’s about understanding how your defenses, people, and processes work together. Just like…

Enhancing security through collaboration with the open-source community
18
Jun
2024

Enhancing security through collaboration with the open-source community

In this Help Net Security interview, Alan DeKok, CEO at NetworkRADIUS, discusses the need for due diligence in selecting and…

Mass exploitation is the new primary attack vector for ransomware
18
Jun
2024

Mass exploitation is the new primary attack vector for ransomware

The cyber threat landscape in 2023 and 2024 has been dominated by mass exploitation, according to WithSecure. Edge service KEV…

42% plan to use API security for AI data protection
18
Jun
2024

42% plan to use API security for AI data protection

While 75% of enterprises are implementing AI, 72% report significant data quality issues and an inability to scale data practices,…

Metomic’s Google User Groups feature alerts users when sensitive data might be at risk
17
Jun
2024

Metomic’s Google User Groups feature alerts users when sensitive data might be at risk

Metomic launched its new integration with Google Groups. The feature enables IT and security teams to ensure data loss prevention…

Malware peddlers love this one social engineering trick!
17
Jun
2024

Malware peddlers love this one social engineering trick!

Attackers are increasingly using a clever social engineering technique to get users to install malware, Proofpoint researchers are warning. The…

Ghidra: Open-source software reverse engineering framework
17
Jun
2024

Ghidra: Open-source software reverse engineering framework

Ghidra, a cutting-edge open-source software reverse engineering (SRE) framework, is a product of the National Security Agency (NSA) Research Directorate….

Low code, high stakes: Addressing SQL injection
17
Jun
2024

Low code, high stakes: Addressing SQL injection

Like a bad movie that seems to go on forever, SQL injection (SQLi) attacks have lingered since the late 1990s….

The rise of SaaS security teams
17
Jun
2024

The rise of SaaS security teams

In this Help Net Security interview, Hillary Baron, Senior Technical Director for Research at CSA, highlights that the recent surge…

Malicious emails trick consumers into false election contributions
17
Jun
2024

Malicious emails trick consumers into false election contributions

Major regional and global events – such as military exercises, political or economic summits, political conventions, and elections – drove…