Category: HelpnetSecurity

Low code, high stakes: Addressing SQL injection
17
Jun
2024

Low code, high stakes: Addressing SQL injection

Like a bad movie that seems to go on forever, SQL injection (SQLi) attacks have lingered since the late 1990s….

The rise of SaaS security teams
17
Jun
2024

The rise of SaaS security teams

In this Help Net Security interview, Hillary Baron, Senior Technical Director for Research at CSA, highlights that the recent surge…

Malicious emails trick consumers into false election contributions
17
Jun
2024

Malicious emails trick consumers into false election contributions

Major regional and global events – such as military exercises, political or economic summits, political conventions, and elections – drove…

Week in review: JetBrains GitHub plugin vulnerability, 20k FortiGate appliances compromised
16
Jun
2024

Week in review: JetBrains GitHub plugin vulnerability, 20k FortiGate appliances compromised

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Users of JetBrains IDEs at…

YetiHunter: Open-source threat hunting tool for Snowflake environments
14
Jun
2024

YetiHunter: Open-source threat hunting tool for Snowflake environments

Cloud identity protection company Permiso has created YetiHunter, a threat detection and hunting tool companies can use to query their…

Modern fraud detection need not rely on PII
14
Jun
2024

Modern fraud detection need not rely on PII

Trends in online fraud detection often act as the canary in the coal mine when it comes to understanding and…

The biggest downsides of digital ID adoption
14
Jun
2024

The biggest downsides of digital ID adoption

As innovative digital verification methods continue to emerge, the debate around their reliability and effectiveness is heating up, according to…

New infosec products of the week: June 14, 2024
14
Jun
2024

New infosec products of the week: June 14, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Acronis, Diligent, Entrust, KELA, Plainsea,…

PHP command injection flaw exploited to deliver ransomware (CVE-2024-4577)
13
Jun
2024

PHP command injection flaw exploited to deliver ransomware (CVE-2024-4577)

An OS command injection vulnerability in Windows-based PHP (CVE-2024-4577) in CGI mode is being exploited by the TellYouThePass ransomware gang….

Urgently needed: AI governance in cyber warfare
13
Jun
2024

Urgently needed: AI governance in cyber warfare

Artificial intelligence is quickly becoming central to societal growth. AI has great power to improve daily life, from education to…

How businesses can integrate token technology into existing payment systems
13
Jun
2024

How businesses can integrate token technology into existing payment systems

In this Help Net Security interview, Mark Nelsen, SVP and Global Head of Consumer Product at Visa, discusses the integration…

GenAI keeps cybersecurity pros on high alert
13
Jun
2024

GenAI keeps cybersecurity pros on high alert

“Businesses across every industry face unprecedented challenges posed by an increasing attack surface, zero-day vulnerabilities, cloud misconfigurations, and new emerging…