Category: HelpnetSecurity

Crowdsourced security is not just for tech companies anymore
02
Feb
2024

Crowdsourced security is not just for tech companies anymore

There is a misconception that only software and technology companies leverage crowdsourced security. However, data contradicts this belief. Companies across…

NIS2 Directive raises stakes for security leaders
02
Feb
2024

NIS2 Directive raises stakes for security leaders

In this Help Net Security interview, Roland Palmer, VP Global Operations Center at Sumo Logic, discusses key challenges and innovations…

New infosec products of the week: February 2, 2024
02
Feb
2024

New infosec products of the week: February 2, 2024

Here’s a look at the most interesting products from the past week, featuring releases from BackBox, ProcessUnity, SentinelOne, and Vade….

DDoS attack power skyrockets to 1.6 Tbps
02
Feb
2024

DDoS attack power skyrockets to 1.6 Tbps

DDoS attack trends for the second half of 2023 reveal alarming developments in their scale and sophistication, according to Gcore….

Malicious logins from suspicious infrastructure fuel identity-based incidents
02
Feb
2024

Malicious logins from suspicious infrastructure fuel identity-based incidents

69% of identity-based incidents involved malicious logins from suspicious infrastructure, which are hosting providers or proxies that aren’t expected for…

BackBox introduces ZTNO to automate zero trust security for network operations
01
Feb
2024

BackBox introduces ZTNO to automate zero trust security for network operations

In a significant stride towards enhancing network security, BackBox introduces Zero Trust Network Operations (ZTNO). This offering is a best…

FritzFrog botnet exploits Log4Shell, PwnKit vulnerabilities
01
Feb
2024

FritzFrog botnet exploits Log4Shell, PwnKit vulnerabilities

The FritzFrog cryptomining botnet has new potential for growth: a recently analyzed variant of the bot is exploiting the Log4Shell…

FBI disrupts Chinese botnet used for targeting US critical infrastructure
01
Feb
2024

FBI disrupts Chinese botnet used for targeting US critical infrastructure

The FBI has disrupted the KV botnet, used by People’s Republic of China (PRC) state-sponsored hackers (aka “Volt Typhoon”) to…

Dynatrace provides end-to-end observability of AI applications
01
Feb
2024

Dynatrace provides end-to-end observability of AI applications

Dynatrace announced it has extended its analytics and automation platform to provide holistic observability and security for LLMs and generative…

Threat actor used Vimeo, Ars Technica to serve second-stage malware
01
Feb
2024

Threat actor used Vimeo, Ars Technica to serve second-stage malware

A financially motivated threat actor tracked as UNC4990 is using booby-trapped USB storage devices and malicious payloads hosted on popular…

CVEMap: Open-source tool to query, browse and search CVEs
01
Feb
2024

CVEMap: Open-source tool to query, browse and search CVEs

CVEMap is an open-source command-line interface (CLI) tool that allows you to explore Common Vulnerabilities and Exposures (CVEs). It’s designed…

Custom rules in security tools can be a game changer for vulnerability detection
01
Feb
2024

Custom rules in security tools can be a game changer for vulnerability detection

In this Help Net interview, Isaac Evans, CEO at Semgrep, discusses the balance between speed and thoroughness in CI/CD pipeline…