Category: HelpnetSecurity

Exposure management is the answer to: “Am I working on the right things?”
08
Jul
2025

Exposure management is the answer to: “Am I working on the right things?”

In this Help Net Security interview, Dan DeCloss, Founder and CTO at PlexTrac, discusses the role of exposure management in…

Cyberattacks are changing the game for major sports events
08
Jul
2025

Cyberattacks are changing the game for major sports events

Sports fans and cybercriminals both look forward to major sporting events, but for very different reasons. Fake ticket sites, stolen…

CISOs urged to fix API risk before regulation forces their hand
08
Jul
2025

CISOs urged to fix API risk before regulation forces their hand

Most organizations are exposing sensitive data through APIs without security controls in place, and they may not even realize it,…

Cybersecurity jobs available right now: July 8, 2025
08
Jul
2025

Cybersecurity jobs available right now: July 8, 2025

Analyst III-Threat Intel Verizon Data Services | India | Hybrid – View job details As an Analyst III-Threat Intel, you…

New technique detects tampering or forgery of a PDF document
07
Jul
2025

New technique detects tampering or forgery of a PDF document

Researchers from the University of Pretoria presented a new technique for detecting tampering in PDF documents by analyzing the file’s…

July 2025 Patch Tuesday forecast: Take a break from the grind
07
Jul
2025

July 2025 Patch Tuesday forecast: Take a break from the grind

There was a barrage of updates released the week of June 2025 Patch Tuesday. This included security updates from Adobe,…

AI built it, but can you trust it?
07
Jul
2025

AI built it, but can you trust it?

In this Help Net Security interview, John Morello, CTO at Minimus, discusses the security risks in AI-driven development, where many…

Aegis Authenticator: Free, open-source 2FA app for Android
07
Jul
2025

Aegis Authenticator: Free, open-source 2FA app for Android

Aegis Authenticator is an open-source 2FA app for Android that helps you manage login codes for your online accounts. The…

Review: Attack Surface Management - Help Net Security
07
Jul
2025

Review: Attack Surface Management – Help Net Security

Attack Surface Management (ASM) has become one of those buzzwords that gets used a lot but rarely explained in detail….

07
Jul
2025

Cloud security maintains its position as top spending priority

While most enterprises have integrated cloud resources into their operations, many need to improve their ability to secure these environments…

Week in review: Sudo local privilege escalation flaws fixed, Google patches actively exploited Chrome
06
Jul
2025

Week in review: Sudo local privilege escalation flaws fixed, Google patches actively exploited Chrome

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Sudo local privilege escalation vulnerabilities…

NTLM relay attacks are back from the dead
04
Jul
2025

NTLM relay attacks are back from the dead

NTLM relay attacks are the easiest way for an attacker to compromise domain-joined hosts. While many security practitioners think NTLM…