Category: HelpnetSecurity
Harnessing the potential of automation in cybersecurity is key to maintaining a robust defense against ever-evolving threats. Still, this approach…
Unix-like Artifacts Collector (UAC) is a live response collection script for incident response that makes use of native binaries and…
Digital threat actors are adopting evolving tactical behaviors, opting for different types of malicious attacks compared to previous years, according…
The Securities and Exchange Commission (SEC) today adopted rules requiring registrants to disclose material cybersecurity incidents they experience and to…
SeeMetrics launched its new Security Performance Boards. Organized by security domains, the new Security Performance Boards are a collection of…
A privilege escalation vulnerability (CVE-2023-30799) could allow attackers to commandeer up to 900,000 MikroTik routers, says VulnCheck researcher Jacob Baines….
BreachRx launched Cyber RegScout, a product purpose-built to automate cybersecurity, privacy and data protection regulatory analysis. Built on BreachRx’s platform,…
A lack of executive understanding and an ever-widening talent gap that is placing an unsustainable burden on security teams to…
In this Help Net Security interview, Dr. Lindsey Polley de Lopez, Director of Cyber & Space Intelligence at MACH37, proposes…
The role of CISO these days requires a strong moral compass: You have to be the one speaking up for…
Time is of the essence when it comes to recovery after Exchange Server failure or database corruption, as organizations depend…
Zero trust is here to stay, with 82% of experts currently working on implementing zero trust, and 16% planning to…











