Category: HelpnetSecurity

08
Aug
2024

Traceeshark: Open-source plugin for Wireshark

Traceeshark is a plugin for Wireshark that enables security practitioners to quickly investigate security incidents. It enhances the capabilities of…

08
Aug
2024

How network segmentation can strengthen visibility in OT networks

What role does the firewall play in the protection of operational technology (OT) networks and systems? Many would say that…

08
Aug
2024

AI security 2024: Key insights for staying ahead of threats

In this Help Net Security interview, Kojin Oshiba, co-founder of Robust Intelligence, discusses his journey from academic research to addressing…

08
Aug
2024

Ransomware operators continue to innovate

Ransomware groups continue to refine their craft, building and scaling business models that resemble legitimate corporate enterprises, according to Rapid7….

08
Aug
2024

Download: CIS Critical Security Controls v8.1

Version 8.1 of the CIS Critical Security Controls (CIS Controls) is an iterative update to version 8.0. It offers prescriptive,…

07
Aug
2024

CrowdStrike engages external experts, details causes of massive outage

CrowdStrike has published a technical root cause analysis of what went wrong when a content update pushed to its Falcon…

07
Aug
2024

Elastic automates SIEM data onboarding with Automatic Import

Elastic is accelerating the adoption of AI-driven security analytics by automating SIEM data onboarding with Automatic Import. This new feature…

07
Aug
2024

Roundcube flaws allow easy email account compromise (CVE-2024-42009, CVE-2024-42008)

Two cross-site scripting vulnerabilities (CVE-2024-42009, CVE-2024-42008) affecting Roundcube could be exploited by attackers to steal users’ emails and contacts, email…

07
Aug
2024

Veza introduces Access AI to streamline risk management and access control

Veza has released Access AI, a generative AI-powered solution to maintain the principle of least privilege at enterprise scale. With…

07
Aug
2024

Cequence Unified API Protection defends against attacks targeting AI applications

Cequence introduced advancements to its Unified API Protection (UAP) platform, specifically tailored to support the secure use of AI applications…

07
Aug
2024

Contrast Security ADR enables teams to identify vulnerabilities, detect threats, and stop attacks

Contrast Security introduced Application Detection and Response (ADR), which empowers security teams to identify vulnerabilities, detect threats, and stop attacks…

07
Aug
2024

OpenWrt dominates, but vulnerabilities persist in OT/IoT router firmware

Forescout has published a new report examining the current state of the software supply chain in OT/IoT routers. The study…