Category: HelpnetSecurity

Latio Application Security Tester: Use AI to scan your code
05
Feb
2024

Latio Application Security Tester: Use AI to scan your code

Latio Application Security Tester is an open-source tool that enables the usage of OpenAI to scan code from the CLI…

Businesses banning or limiting use of GenAI over privacy risks
05
Feb
2024

Businesses banning or limiting use of GenAI over privacy risks

Privacy is much more than a regulatory compliance matter. Findings from a new Cisco study highlight the growing Privacy concerns…

Week in review: Windows Event Log zero-day, exploited critical Jenkins RCE flaw
04
Feb
2024

Week in review: Windows Event Log zero-day, exploited critical Jenkins RCE flaw

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Prioritizing cybercrime intelligence for effective…

EU adopts first cybersecurity certification scheme for safer tech
02
Feb
2024

EU adopts first cybersecurity certification scheme for safer tech

The European Commission adopted the implementing regulation concerning the EU cybersecurity certification scheme on Common Criteria (EUCC). The outcome aligns…

Crowdsourced security is not just for tech companies anymore
02
Feb
2024

Crowdsourced security is not just for tech companies anymore

There is a misconception that only software and technology companies leverage crowdsourced security. However, data contradicts this belief. Companies across…

NIS2 Directive raises stakes for security leaders
02
Feb
2024

NIS2 Directive raises stakes for security leaders

In this Help Net Security interview, Roland Palmer, VP Global Operations Center at Sumo Logic, discusses key challenges and innovations…

New infosec products of the week: February 2, 2024
02
Feb
2024

New infosec products of the week: February 2, 2024

Here’s a look at the most interesting products from the past week, featuring releases from BackBox, ProcessUnity, SentinelOne, and Vade….

DDoS attack power skyrockets to 1.6 Tbps
02
Feb
2024

DDoS attack power skyrockets to 1.6 Tbps

DDoS attack trends for the second half of 2023 reveal alarming developments in their scale and sophistication, according to Gcore….

Malicious logins from suspicious infrastructure fuel identity-based incidents
02
Feb
2024

Malicious logins from suspicious infrastructure fuel identity-based incidents

69% of identity-based incidents involved malicious logins from suspicious infrastructure, which are hosting providers or proxies that aren’t expected for…

BackBox introduces ZTNO to automate zero trust security for network operations
01
Feb
2024

BackBox introduces ZTNO to automate zero trust security for network operations

In a significant stride towards enhancing network security, BackBox introduces Zero Trust Network Operations (ZTNO). This offering is a best…

FritzFrog botnet exploits Log4Shell, PwnKit vulnerabilities
01
Feb
2024

FritzFrog botnet exploits Log4Shell, PwnKit vulnerabilities

The FritzFrog cryptomining botnet has new potential for growth: a recently analyzed variant of the bot is exploiting the Log4Shell…

FBI disrupts Chinese botnet used for targeting US critical infrastructure
01
Feb
2024

FBI disrupts Chinese botnet used for targeting US critical infrastructure

The FBI has disrupted the KV botnet, used by People’s Republic of China (PRC) state-sponsored hackers (aka “Volt Typhoon”) to…