Category: HelpnetSecurity

Faction: Open-source pentesting report generation and collaboration framework
30
Jan
2024

Faction: Open-source pentesting report generation and collaboration framework

Faction is an open-source solution that enables pentesting report generation and assessment collaboration. Josh Summitt, the creator of Faction, has…

Great security or great UX? Both, please
30
Jan
2024

Great security or great UX? Both, please

A new user is signing up for a SaaS application. On the one hand, UX teams want that user to…

Unlocking sustainable security practices with secure coding education
30
Jan
2024

Unlocking sustainable security practices with secure coding education

Despite stringent regulations and calls for ‘security by design’, organizations are still failing to equip teams with the knowledge to…

Critical Jenkins RCE flaw exploited in the wild. Patch now! (CVE-2024-23897)
29
Jan
2024

Critical Jenkins RCE flaw exploited in the wild. Patch now! (CVE-2024-23897)

Several proof-of-concept (PoC) exploits for a recently patched critical vulnerability (CVE-2024-23897) in Jenkins has been made public and there’s evidence…

Cybercriminals embrace smarter strategies, less effort
29
Jan
2024

Cybercriminals embrace smarter strategies, less effort

2024 is shaping up to be a record-breaking year for data breaches, according to Experian. Despite 2023 being labeled as…

Prioritizing cybercrime intelligence for effective decision-making in cybersecurity
29
Jan
2024

Prioritizing cybercrime intelligence for effective decision-making in cybersecurity

In this Help Net Security interview, Alon Gal, CTO at Hudson Rock, discusses integrating cybercrime intelligence into existing security infrastructures….

Third-party risk management best practices and why they matter
29
Jan
2024

Third-party risk management best practices and why they matter

With organizations increasingly relying on third-party vendors, upping the third-party risk management (TPRM) game has become imperative to prevent the…

Global critical infrastructure faces relentless cyber activity
29
Jan
2024

Global critical infrastructure faces relentless cyber activity

In the last year, the world’s critical infrastructure – the medical, power, communications, waste, manufacturing, and transportation equipment that connects…

Week in review: 15 million Trello users’ scraped data on sale, attackers can steal NTLM hashes
28
Jan
2024

Week in review: 15 million Trello users’ scraped data on sale, attackers can steal NTLM hashes

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: The reality of hacking threats…

Essential questions for developing effective human rights policies
26
Jan
2024

Essential questions for developing effective human rights policies

Growing environmental, social, and governance (ESG) expectations and expanding global regulation are propelling organizations to consider implementing a stand-alone human…

New infosec products of the week: January 26, 2024
26
Jan
2024

New infosec products of the week: January 26, 2024

Here’s a look at the most interesting products from the past week, featuring releases from 1Kosmos, Atakama, Onfido, Regula, Searchlight…

Longer passwords aren't safe from intensive cracking efforts
26
Jan
2024

Longer passwords aren’t safe from intensive cracking efforts

88% of organizations still use passwords as their primary method of authentication, according to Specops Software. The report found that…