Category: HelpnetSecurity

EchoStrike: Generate undetectable reverse shells, perform process injection
16
Sep
2024

EchoStrike: Generate undetectable reverse shells, perform process injection

EchoStrike is an open-source tool designed to generate undetectable reverse shells and execute process injection on Windows systems. “EchoStrike allows…

Compliance frameworks and GenAI: The Wild West of security standards
16
Sep
2024

Compliance frameworks and GenAI: The Wild West of security standards

In this Help Net Security interview, Kristian Kamber, CEO at SplxAI, discusses how security challenges for GenAI differ from traditional…

Trends and dangers in open-source software dependencies
16
Sep
2024

Trends and dangers in open-source software dependencies

A C-suite perspective on potential vulnerabilities within open-source dependencies or software packages reveals that, while remediation costs for dependency risks…

eBook: Navigating compliance with a security-first approach
16
Sep
2024

eBook: Navigating compliance with a security-first approach

As cyberattacks escalate, more regulations are being introduced to help protect organizations and their customers’ data. This has resulted in…

Week in review: Veeam Backup & Replication RCE could soon be exploited, Microsoft fixes 4 0-days
15
Sep
2024

Week in review: Veeam Backup & Replication RCE could soon be exploited, Microsoft fixes 4 0-days

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Veeam Backup & Replication RCE…

New infosec products of the week: September 13, 2024
13
Sep
2024

New infosec products of the week: September 13, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Druva, Huntress, Ketch, LOKKER, Tenable,…

Security measures fail to keep up with rising email attacks
13
Sep
2024

Security measures fail to keep up with rising email attacks

Organizations must reassess their email security posture as incidents continue to escalate, leading to financial losses. Key findings reveal a…

How to make Infrastructure as Code secure by default
13
Sep
2024

How to make Infrastructure as Code secure by default

Infrastructure as Code (IaC) has become a widely adopted practice in modern DevOps, automating the management and provisioning of technology…

Organizations still don't know how to handle non-human identities
13
Sep
2024

Organizations still don’t know how to handle non-human identities

Organizations are grappling with their current NHI (non-human identities) security strategies, according to Cloud Security Alliance and Astrix Security. The…

Cyber insurance set for explosive growth
13
Sep
2024

Cyber insurance set for explosive growth

Cyber insurance is poised for exponential growth over the coming decade, but it remains a capital-intensive peril that requires structural…

Dru Investigate simplifies cyber investigations and helps users uncover data threats
12
Sep
2024

Dru Investigate simplifies cyber investigations and helps users uncover data threats

Druva launched Dru Investigate, a gen AI-powered tool that guides data security investigations using a natural language interface. With Dru…

Suspect arrested over the Transport for London cyberattack
12
Sep
2024

Suspect arrested over the Transport for London cyberattack

The UK National Crime Agency has arrested and detained a suspect – a 17-year-old male in Walsall (West Midlands) –…