Category: HelpnetSecurity

Corporate boards pressure CISOs to step up risk mitigation efforts
26
Apr
2023

Corporate boards pressure CISOs to step up risk mitigation efforts

While those working in InfoSec and GRC have high levels of confidence in their cyber/IT risk management systems, persistent problems…

Halo Security detects exposed secrets and API keys in JavaScript
26
Apr
2023

Halo Security detects exposed secrets and API keys in JavaScript

Web properties are increasingly relying on third-party JavaScript to increase functionality, but this can also bring inherent risks. A report…

Most SaaS adopters exposed to browser-borne attacks
25
Apr
2023

Most SaaS adopters exposed to browser-borne attacks

Even though the adoption of SaaS apps started more than ten years ago, CISOs are still finding it challenging to…

Abnormal Security expands its platform and launches new products
25
Apr
2023

Abnormal Security expands its platform and launches new products

At RSA Conference 2023, Abnormal Security launched three new products focused on expanding security detection for Slack, Microsoft Teams and…

PoC exploit for abused PaperCut flaw is now public (CVE-2023-27350)
25
Apr
2023

PoC exploit for abused PaperCut flaw is now public (CVE-2023-27350)

An unauthenticated RCE flaw (CVE-2023-27350) in widely-used PaperCut MF and NG print management software is being exploited by attackers to…

Google adds new risk assessment tool for Chrome extensions
25
Apr
2023

Google adds new risk assessment tool for Chrome extensions

Google has made available a new tool for Google Workspace admins and security teams to make an assessment of the…

Attackers are logging in instead of breaking in
25
Apr
2023

Attackers are logging in instead of breaking in

Cyberattackers leveraged more than 500 unique tools and tactics in 2022, according to Sophos. The data, analyzed from more than…

Arista Networks unveils AI-driven network identity service
25
Apr
2023

Arista Networks unveils AI-driven network identity service

Arista Networks announced at the RSA Conference 2023 a cloud-delivered, AI-driven network identity service for enterprise security and IT operations….

AI tools help attackers develop sophisticated phishing campaigns
25
Apr
2023

AI tools help attackers develop sophisticated phishing campaigns

Phishing scams are a growing threat, and cybercriminals’ methods are becoming increasingly sophisticated, making them harder to detect and block,…

The silent killers in digital healthcare
25
Apr
2023

The silent killers in digital healthcare

As digital transformation revolutionizes the healthcare industry, its use of API (application programming interfaces) technology is skyrocketing. APIs, which help…

The double-edged sword of open-source software
25
Apr
2023

The double-edged sword of open-source software

The lack of visibility into the software supply chain creates an unsustainable cycle of discovering vulnerabilities and weaknesses in software…

Rethinking the effectiveness of current authentication initiatives
25
Apr
2023

Rethinking the effectiveness of current authentication initiatives

As user credentials continue to be a top vector for cyberattacks, organizations are under tremendous pressure to rethink the effectiveness…