Category: HelpnetSecurity

FritzFrog botnet exploits Log4Shell, PwnKit vulnerabilities
01
Feb
2024

FritzFrog botnet exploits Log4Shell, PwnKit vulnerabilities

The FritzFrog cryptomining botnet has new potential for growth: a recently analyzed variant of the bot is exploiting the Log4Shell…

FBI disrupts Chinese botnet used for targeting US critical infrastructure
01
Feb
2024

FBI disrupts Chinese botnet used for targeting US critical infrastructure

The FBI has disrupted the KV botnet, used by People’s Republic of China (PRC) state-sponsored hackers (aka “Volt Typhoon”) to…

Dynatrace provides end-to-end observability of AI applications
01
Feb
2024

Dynatrace provides end-to-end observability of AI applications

Dynatrace announced it has extended its analytics and automation platform to provide holistic observability and security for LLMs and generative…

Threat actor used Vimeo, Ars Technica to serve second-stage malware
01
Feb
2024

Threat actor used Vimeo, Ars Technica to serve second-stage malware

A financially motivated threat actor tracked as UNC4990 is using booby-trapped USB storage devices and malicious payloads hosted on popular…

CVEMap: Open-source tool to query, browse and search CVEs
01
Feb
2024

CVEMap: Open-source tool to query, browse and search CVEs

CVEMap is an open-source command-line interface (CLI) tool that allows you to explore Common Vulnerabilities and Exposures (CVEs). It’s designed…

Custom rules in security tools can be a game changer for vulnerability detection
01
Feb
2024

Custom rules in security tools can be a game changer for vulnerability detection

In this Help Net interview, Isaac Evans, CEO at Semgrep, discusses the balance between speed and thoroughness in CI/CD pipeline…

Zero trust implementation: Plan, then execute, one step at a time
01
Feb
2024

Zero trust implementation: Plan, then execute, one step at a time

82% of cybersecurity professionals have been working on implementing zero trust last year, and 16% should be on it by…

Payment fraud is hitting organizations harder than ever before
01
Feb
2024

Payment fraud is hitting organizations harder than ever before

96% of US companies were targeted with at least one fraud attempt in the past year, according to Trustpair. 83%…

A zero-day vulnerability (and PoC) to blind defenses relying on Windows event logs
31
Jan
2024

A zero-day vulnerability (and PoC) to blind defenses relying on Windows event logs

A zero-day vulnerability that, when triggered, could crash the Windows Event Log service on all supported (and some legacy) versions…

How to make developers accept DevSecOps
31
Jan
2024

How to make developers accept DevSecOps

According to a recent Dynatrace report, only 50% of CISOs believe that development teams have thoroughly tested the software for…

Free ransomware recovery tool White Phoenix now has a web version
31
Jan
2024

Free ransomware recovery tool White Phoenix now has a web version

White Phoenix is a free ransomware recovery tool for situations where files are encrypted with intermittent encryption. It was tested…

Proactive cybersecurity: A strategic approach to cost efficiency and crisis management
31
Jan
2024

Proactive cybersecurity: A strategic approach to cost efficiency and crisis management

In this Help Net Security interview, Stephanie Hagopian, VP of Security at CDW, discusses offensive strategies in the face of…