Category: HelpnetSecurity

Developer errors lead to long-term exposure of sensitive data in Git repos
26
Jun
2024

Developer errors lead to long-term exposure of sensitive data in Git repos

Credentials, API tokens, and passkeys – collectively referred to as secrets – from organizations around the globe were exposed for…

B+ security rating masks healthcare supply chain risks
26
Jun
2024

B+ security rating masks healthcare supply chain risks

While the healthcare sector gets a “B+” security rating for the first half of 2024, it faces a critical vulnerability:…

Cybersecurity jobs available right now: June 26, 2024
26
Jun
2024

Cybersecurity jobs available right now: June 26, 2024

CISO Influx | Indonesia | Remote – View job details As a CISO, you will be responsible for protecting Influx…

Future trends in cyber warfare: Predictions for AI integration and space-based operations
26
Jun
2024

Future trends in cyber warfare: Predictions for AI integration and space-based operations

In this Help Net Security interview, Morgan Wright, Chief Security Advisor at SentinelOne, discusses how AI is utilized in modern…

Progress quietly fixes MOVEit auth bypass flaws (CVE-2024-5805, CVE-2024-5806)
25
Jun
2024

Progress quietly fixes MOVEit auth bypass flaws (CVE-2024-5805, CVE-2024-5806)

Progress Software has patched one critical (CVE-2024-5805) and one high-risk (CVE-2024-5806) vulnerability in MOVEit, its widely used managed file transfer…

Ransomware disrupts Indonesia's national data centre, LockBit gang claims US Federal Reserve breach
25
Jun
2024

Ransomware disrupts Indonesia’s national data centre, LockBit gang claims US Federal Reserve breach

Ransomware attackers wielding a LockBit variant dubbed Brain Cipher have disrupted a temporary national data center facility which supports the…

New security loophole allows spying on internet users' online activity
25
Jun
2024

New security loophole allows spying on internet users’ online activity

Researchers at Graz University of Technology were able to spy on users’ online activities simply by monitoring fluctuations in the…

Breaking down the numbers: Q2 2024 cybersecurity funding activity recap
25
Jun
2024

Breaking down the numbers: Q2 2024 cybersecurity funding activity recap

We present a list of selected cybersecurity companies that received funding during the second quarter of 2024 (Q2 2024). Alethea…

Zeek: Open-source network traffic analysis, security monitoring
25
Jun
2024

Zeek: Open-source network traffic analysis, security monitoring

Zeek is an open-source network analysis framework. Unlike an active security device such as a firewall, Zeek operates on a…

CISOs' new ally: Qualys CyberSecurity Asset Management 3.0
25
Jun
2024

CISOs’ new ally: Qualys CyberSecurity Asset Management 3.0

In this Help Net Security interview, Kunal Modasiya, VP of Product Management and Growth at Qualys, explores the key features,…

Guide to mitigating credential stuffing attacks
25
Jun
2024

Guide to mitigating credential stuffing attacks

We have a collective unaddressed weakness when it comes to basic cybersecurity. Out of the many reports circulating in the…

Open-source Rafel RAT steals info, locks Android devices, asks for ransom
24
Jun
2024

Open-source Rafel RAT steals info, locks Android devices, asks for ransom

The open-source Rafel RAT is being leveraged by multiple threat actors to compromise Android devices and, in some cases, to…