Category: HelpnetSecurity

DockerSpy: Search for images on Docker Hub, extract sensitive information
11
Sep
2024

DockerSpy: Search for images on Docker Hub, extract sensitive information

DockerSpy scans Docker Hub for images and retrieves sensitive information, including authentication secrets, private keys, and other confidential data. “DockerSpy…

Cybersecurity jobs available right now: September 11, 2024
11
Sep
2024

Cybersecurity jobs available right now: September 11, 2024

ACISO HTX | Singapore | Hybrid – View job details As an ACISO, you will formulate Agency ICT security strategy…

eBook: Keep assets secure after cloud migration
11
Sep
2024

eBook: Keep assets secure after cloud migration

Organizations sometimes need to plan their cloud migrations with more emphasis on security and compliance. Many, therefore, struggle to keep…

LOKKER's consent management solution blocks all unauthorized data collection on websites
11
Sep
2024

LOKKER’s consent management solution blocks all unauthorized data collection on websites

LOKKER released a new consent management solution available in its Privacy Edge Platform. This builds on LOKKER’s earlier release of…

Microsoft fixes 4 exploited zero-days and a code defect that nixed earlier security fixes
11
Sep
2024

Microsoft fixes 4 exploited zero-days and a code defect that nixed earlier security fixes

September 2024 Patch Tuesday is here and Microsoft has delivered 79 fixes, including those for a handful of zero-days (CVE-2024-38217,…

Ketch helps media brands enable privacy-safe data activation
10
Sep
2024

Ketch helps media brands enable privacy-safe data activation

Ketch launched its product suite for digital media brands. The digital media industry faces increasing challenges. Intense FTC scrutiny on…

CISA confirms that SonicWall vulnerability is getting exploited (CVE-2024-40766)
10
Sep
2024

CISA confirms that SonicWall vulnerability is getting exploited (CVE-2024-40766)

The US Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2024-40766 – a recently fixed improper access control vulnerability affecting…

33 open-source cybersecurity solutions you didn’t know you needed
10
Sep
2024

33 open-source cybersecurity solutions you didn’t know you needed

Open-source cybersecurity tools provide transparency and flexibility, allowing users to examine and customize the source code to fit specific security…

How human-led threat hunting complements automation in detecting cyber threats
10
Sep
2024

How human-led threat hunting complements automation in detecting cyber threats

In this Help Net Security interview, Shane Cox, Director, Cyber Fusion Center at MorganFranklin Consulting, discusses the evolving methodologies and…

Zyxel fixes critical command injection flaw in EOL NAS devices (CVE-2024-6342)
10
Sep
2024

Zyxel fixes critical command injection flaw in EOL NAS devices (CVE-2024-6342)

Users of Zyxel network-attached storage (NAS) devices are urged to implement hotfixes addressing a critical and easily exploited command injection…

Free SaaS Pulse tool from Wing Security enhances SaaS security posture
10
Sep
2024

Free SaaS Pulse tool from Wing Security enhances SaaS security posture

Wing Security has released SaaS Pulse, a free tool for SaaS security management, offering organizations actionable insights and continuous oversight…

Huntress launches Managed SIEM, eliminating the complexity of traditional SIEMs
10
Sep
2024

Huntress launches Managed SIEM, eliminating the complexity of traditional SIEMs

Huntress announces the arrival of its new Managed SIEM solution, designed to serve small—to mid-sized enterprises and their MSP allies…