Category: HelpnetSecurity

SMS Stealer malware targeting Android users: Over 105,000 samples identified
31
Jul
2024

SMS Stealer malware targeting Android users: Over 105,000 samples identified

Zimperium’s zLabs team has uncovered a new and widespread threat dubbed SMS Stealer. Detected during routine malware analysis, this malicious…

Microsoft: DDoS defense error amplified attack on Azure, leading to outage
31
Jul
2024

Microsoft: DDoS defense error amplified attack on Azure, leading to outage

A DDoS attack that started on Tuesday has made a number of Microsoft Azure and Microsoft 365 services temporarily inaccessible,…

Fortanix expands Key Insight to enhance cryptographic security across hybrid environments
31
Jul
2024

Fortanix expands Key Insight to enhance cryptographic security across hybrid environments

Fortanix announced a major expansion to the Key Insight solution, allowing organizations to discover, assess, and remediate their fragmented cryptographic…

Innovative approach promises faster bug fixes
31
Jul
2024

Innovative approach promises faster bug fixes

Modern software applications usually consist of numerous files and several million lines of code. Due to the sheer quantity, finding…

Leveraging dynamic configuration for seamless and compliant software changes
31
Jul
2024

Leveraging dynamic configuration for seamless and compliant software changes

In this Help Net Security interview, Konrad Niemiec, CEO and Founder of Lekko, discusses the benefits of dynamic configuration in…

What CISOs need to keep CEOs (and themselves) out of jail
31
Jul
2024

What CISOs need to keep CEOs (and themselves) out of jail

Former Uber CISO Joe Sullivan, who was convicted for attempting to cover up a data breach Uber suffered in 2016,…

Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
31
Jul
2024

Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave

Secretive is an open-source, user-friendly app designed to store and manage SSH keys within the Secure Enclave. Typically, SSH keys…

Cybersecurity jobs available right now: July 31, 2024
31
Jul
2024

Cybersecurity jobs available right now: July 31, 2024

Cloud Security Architect Precisely | United Kingdom | Remote – View job details As a Cloud Security Architect, you will…

Adaptive Shield unveils ITDR platform for SaaS
30
Jul
2024

Adaptive Shield unveils ITDR platform for SaaS

Adaptive Shield has unveiled its Identity Threat Detection & Response (ITDR) platform for SaaS environments. The recent Snowflake breach served…

Average data breach cost jumps to $4.88 million, collateral damage increased
30
Jul
2024

Average data breach cost jumps to $4.88 million, collateral damage increased

IBM released its annual Cost of a Data Breach Report revealing the global average cost of a data breach reached…

Coding practices: The role of secure programming languages
30
Jul
2024

Coding practices: The role of secure programming languages

Safety and quality are not features that can be added through testing — they must be integral to the design….

Review: Action1 – Simple and powerful patch management
30
Jul
2024

Review: Action1 – Simple and powerful patch management

Although endpoint anti-malware and other security controls are now standard at the operating system level, keeping all endpoint software up-to-date…