Category: HelpnetSecurity

Suricata: Open-source network analysis and threat detection
02
Oct
2024

Suricata: Open-source network analysis and threat detection

Suricata is an open-source network intrusion detection system (IDS), intrusion prevention system (IPS), and network security monitoring engine. Suricata features…

Cybersecurity hiring slows, pros' stress levels rise
02
Oct
2024

Cybersecurity hiring slows, pros’ stress levels rise

66% of cybersecurity professionals say their role is more stressful now than it was five years ago, according to ISACA….

Use Windows event logs for ransomware investigations, JPCERT/CC advises
01
Oct
2024

Use Windows event logs for ransomware investigations, JPCERT/CC advises

The JPCERT Coordination Center – the first Computer Security Incident Response Team established in Japan – has compiled a list…

Reducing credential complexity with identity federation
01
Oct
2024

Reducing credential complexity with identity federation

In this Help Net Security interview, Omer Cohen, Chief Security Officer at Descope, discusses the impact of identity federation on…

3 easy microsegmentation projects - Help Net Security
01
Oct
2024

3 easy microsegmentation projects – Help Net Security

Like many large-scale network security projects, microsegmentation can seem complex, time-consuming, and expensive. It involves managing intricate details about inter-device…

Password management habits you should unlearn
01
Oct
2024

Password management habits you should unlearn

Despite advancements in security technology, many individuals and organizations continue to rely on outdated and vulnerable authentication methods, leaving themselves…

Infosec products of the month: September 2024
01
Oct
2024

Infosec products of the month: September 2024

Here’s a look at the most interesting products from the past month, featuring releases from: Absolute, anecdotes, ArmorCode, Binarly, Bitdefender,…

Ransomware attackers hop from on-premises systems to cloud to compromise Microsoft 365 accounts
30
Sep
2024

Ransomware attackers hop from on-premises systems to cloud to compromise Microsoft 365 accounts

Storm-0501, an affiliate of several high-profile ransomware-as-a-service outfits, has been spotted compromising targets’ cloud environments and on-premises systems. “Storm-0501 is…

Microsoft revised the controversial Copilot+ Recall feature
30
Sep
2024

Microsoft revised the controversial Copilot+ Recall feature

Microsoft has made changes to Recall – the screenshot-taking, AI-powered search feature for Copilot+ PCs running Windows 11 – to…

Open source maintainers: Key to software health and security
30
Sep
2024

Open source maintainers: Key to software health and security

Open source has become the foundation of modern application development, with up to 98% of applications incorporating open-source components and…

Could APIs be the undoing of AI?
30
Sep
2024

Could APIs be the undoing of AI?

Application programming interfaces (APIs) are essential to how generative AI (GenAI) functions with agents (e.g., calling upon them for data)….

SCCMSecrets: Open-source SCCM policies exploitation tool
30
Sep
2024

SCCMSecrets: Open-source SCCM policies exploitation tool

SCCMSecrets is an open-source tool that exploits SCCM policies, offering more than just NAA credential extraction. SCCM policies are a…