Category: HelpnetSecurity

How AI is revolutionizing identity fraud
09
Feb
2024

How AI is revolutionizing identity fraud

Nearly half of businesses reported a growth in synthetic identity fraud, while biometric spoofs and counterfeit ID fraud attempts also…

LassPass is not LastPass: Fraudulent app on Apple App Store
08
Feb
2024

LassPass is not LastPass: Fraudulent app on Apple App Store

A fraudulent app named “LassPass Password Manager” that mimics the legitimate LastPass mobile app can currently be found on Apple’s…

Akira, LockBit actively searching for vulnerable Cisco ASA devices
08
Feb
2024

Akira, LockBit actively searching for vulnerable Cisco ASA devices

Akira and Lockbit ransomware groups are trying to breach Cisco ASA SSL VPN devices by exploiting several older vulnerabilities, security…

SOAPHound: Open-source tool to collect Active Directory data via ADWS
08
Feb
2024

SOAPHound: Open-source tool to collect Active Directory data via ADWS

SOAPHound is an open-source data collection tool capable of enumerating Active Directory environments through the Active Directory Web Services (ADWS)…

Choosing the right partner when outsourcing cybersecurity
08
Feb
2024

Choosing the right partner when outsourcing cybersecurity

In this Help Net Security interview, Anya Shpilman, Senior Executive, Cyber Security Services at WDigital, discusses the benefits and potential…

10 tips for creating your security hackathon playbook
08
Feb
2024

10 tips for creating your security hackathon playbook

For more than 12 years, I’ve been organizing and running hackathons with the goal of finding security vulnerabilities and fixing…

As-a-Service tools empower criminals with limited tech skills
08
Feb
2024

As-a-Service tools empower criminals with limited tech skills

As-a-service attacks continue to dominate the threat landscape, with Malware-as-a-Service (MaaS) and Ransomware-as-a-Service (RaaS) tools making up the majority of…

Qualys TotalCloud 2.0 measures cyber risk in cloud and SaaS apps
07
Feb
2024

Qualys TotalCloud 2.0 measures cyber risk in cloud and SaaS apps

Qualys unveiled TotalCloud 2.0. This significant upgrade to Qualys’ AI-powered cloud native application protection platform (CNAPP) delivers a single prioritized…

Chinese hackers breached Dutch Ministry of Defense
07
Feb
2024

Chinese hackers breached Dutch Ministry of Defense

Chinese state-sponsored hackers have breached the Dutch Ministry of Defense (MOD) last year and deployed a new remote access trojan…

The fight against commercial spyware misuse is heating up
07
Feb
2024

The fight against commercial spyware misuse is heating up

Though there are organizations out there investigating how commercial spyware is misused to target journalists, human rights defenders and dissidents,…

On-premises JetBrains TeamCity servers vulnerable to auth bypass (CVE-2024-23917)
07
Feb
2024

On-premises JetBrains TeamCity servers vulnerable to auth bypass (CVE-2024-23917)

JetBrains has patched a critical authentication bypass vulnerability (CVE-2024-23917) affecting TeamCity On-Premises continuous integration and deployment servers. About CVE-2024-23917 CVE-2024-23917…

Cybersecurity teams hesitate to use automation in TDIR workflows
07
Feb
2024

Cybersecurity teams hesitate to use automation in TDIR workflows

Despite reported threat detection, investigation, and response (TDIR) improvements in security operations, more than half of organizations still experienced significant…