Category: HelpnetSecurity
Censys announced two new product tiers of its search tool, Censys Search Solo and Censys Search Teams. These additions are…
North Korea-backed group Lazarus has been spotted exploiting the Log4Shell vulnerability (CVE-2021-44228) and novel malware written in DLang (i.e., the…
Recruiters are being targeted via spear-phishing emails sent by cybercrooks impersonating job applicants, Proofpoint researchers are warning. “The tone and…
SafeBreach researchers have discovered eight new process injection techniques that can be used to covertly execute malicious code on Windows…
A significant number of popular websites still allow users to choose weak or even single-character passwords, researchers at Georgia Institute…
The European Union’s attempt to reform its electronic identification and trust services – a package of laws better known as…
In this Help Net Security interview, Matt Holland, CEO of Field Effect, discusses achieving a balance for businesses between the…
Nemesis is a centralized data processing platform that ingests, enriches, and performs analytics on offensive security assessment data (i.e., data…
42% of businesses report employees with BYOD devices in business settings that use tools like WhatsApp have led to new…
With its innovative feature for generating reliable Vulnerability Exploitability eXchange (VEX) documents, Kubescape became the first open-source project to provide…
As an IT professional, you understand the value of automation, and like many IT experts, you may approach it with…
In this Help Net Security interview, Mike Regan, VP of Business Performance at TIA, discusses SCS 9001 Release 2.0, a…











