Category: HelpnetSecurity

Custom rules in security tools can be a game changer for vulnerability detection
01
Feb
2024

Custom rules in security tools can be a game changer for vulnerability detection

In this Help Net interview, Isaac Evans, CEO at Semgrep, discusses the balance between speed and thoroughness in CI/CD pipeline…

Zero trust implementation: Plan, then execute, one step at a time
01
Feb
2024

Zero trust implementation: Plan, then execute, one step at a time

82% of cybersecurity professionals have been working on implementing zero trust last year, and 16% should be on it by…

Payment fraud is hitting organizations harder than ever before
01
Feb
2024

Payment fraud is hitting organizations harder than ever before

96% of US companies were targeted with at least one fraud attempt in the past year, according to Trustpair. 83%…

A zero-day vulnerability (and PoC) to blind defenses relying on Windows event logs
31
Jan
2024

A zero-day vulnerability (and PoC) to blind defenses relying on Windows event logs

A zero-day vulnerability that, when triggered, could crash the Windows Event Log service on all supported (and some legacy) versions…

How to make developers accept DevSecOps
31
Jan
2024

How to make developers accept DevSecOps

According to a recent Dynatrace report, only 50% of CISOs believe that development teams have thoroughly tested the software for…

Free ransomware recovery tool White Phoenix now has a web version
31
Jan
2024

Free ransomware recovery tool White Phoenix now has a web version

White Phoenix is a free ransomware recovery tool for situations where files are encrypted with intermittent encryption. It was tested…

Proactive cybersecurity: A strategic approach to cost efficiency and crisis management
31
Jan
2024

Proactive cybersecurity: A strategic approach to cost efficiency and crisis management

In this Help Net Security interview, Stephanie Hagopian, VP of Security at CDW, discusses offensive strategies in the face of…

Does CVSS 4.0 solve the exploitability problem?
31
Jan
2024

Does CVSS 4.0 solve the exploitability problem?

The newest version of the vulnerability scoring system CVSS 4.0 is here! After a lengthy gap between version 3 (released…

Cybercriminals replace familiar tactics to exfiltrate sensitive data
31
Jan
2024

Cybercriminals replace familiar tactics to exfiltrate sensitive data

Ransomware attacks are increasing again as cybercriminals’ motivation shifts to data exfiltration, according to Delinea. The familiar tactics of crippling…

Database management enters a new era of complexity
31
Jan
2024

Database management enters a new era of complexity

Increasing complexity, the rapid adoption of emerging technologies and a growing skills gap are the biggest concerns facing IT leaders…

Self-managed GitLab installations should be patched again (CVE-2024-0402)
30
Jan
2024

Self-managed GitLab installations should be patched again (CVE-2024-0402)

Less than two weeks after having plugged a security hole that allows account takeover without user interaction, GitLab Inc. has…

Balancing AI benefits with security and privacy risks in healthcare
30
Jan
2024

Balancing AI benefits with security and privacy risks in healthcare

To manage an environment of increasing risks and limited resources, healthcare internal audit and compliance departments must align their risk…