Campaign URL
Copy
Twitter
0
tweets
Subscribe
Past Issues
RSS
Translate
English
العربية
Afrikaans
беларуская мова
български
català
中文(简体)
中文(繁體)
Hrvatski
Česky
Dansk
eesti keel
Nederlands
Suomi
Français
Deutsch
Ελληνική
हिन्दी
Magyar
Gaeilge
Indonesia
íslenska
Italiano
日本語
ភាសាខ្មែរ
한국어
македонски јазик
بهاس ملايو
Malti
Norsk
Polski
Português
Português - Portugal
Română
Русский
Español
Kiswahili
Svenska
עברית
Lietuvių
latviešu
slovenčina
slovenščina
српски
தமிழ்
ภาษาไทย
Türkçe
Filipino
украї́нська
Tiếng Việt
Latest information security news and research from Help Net Security
Help Net Security weekly newsletter
View in your browser
.
AppSec teams must fix hard-coded credentials. Here are 3 resources on how to do that in 2024:
How to Handle Secrets Like a Pro
Join the State of Secrets Sprawl 2024 waitlist
How to Evaluate a Secrets Detection Platforms?
Latest news:
Week in review: LockBit leak site is back online, NIST updates its Cybersecurity Framework
Cybercriminals harness AI for new era of malware development
JCDC’s strategic shift: Prioritizing cyber hardening
Businesses foresee major impact from new SEC cybersecurity disclosure rules
98% of businesses linked to breached third parties
New infosec products of the week: March 1, 2024
Airbnb scammers pose as hosts, redirect users to fake Tripadvisor site
ALPHV/BlackCat threatens to leak data stolen in Change Healthcare cyberattack
Kali Linux 2024.1 released: New tools, new look, new Kali Nethunter kernels
BobTheSmuggler: Open-source tool for undetectable payload delivery
How organizations can navigate identity security risks in 2024
Cryptojacking is no longer the sole focus of cloud attackers
Vishing, smishing, and phishing attacks skyrocket 1,265% post-ChatGPT
The CISO’s guide to reducing the SaaS attack surface
Infosec products of the month: February 2024
European retailer Pepco loses €15.5 million in phishing (possibly BEC?) attack
State-sponsored hackers know enterprise VPN appliances inside out
Understanding employees’ motivations behind risky actions
AI-driven DevOps: Revolutionizing software engineering practices
How AI is reshaping the cybersecurity job landscape
AI in cybersecurity presents a complex duality
White House: Use memory-safe programming languages to protect the nation
Meta plans to prevent disinformation and AI-generated content from influencing voters
APT29 revamps its techniques to breach cloud environments
NIST CSF 2.0 released, to help all organizations, not just those in critical infrastructure
Using AI to reduce false positives in secrets scanners
Overcoming the pressures of cybersecurity startup leadership
Enterprises’ progress in digital trust implementation is far from great
Unmanaged third-party access threatens OT environments
LockBit leak site is back online
Pikabot returns with new tricks up its sleeve
ScreenConnect flaws exploited to deliver all kinds of malware (CVE-2024-1709, CVE-2024-1708)
Web Check: Open-source intelligence for any website
It’s time for security operations to ditch Excel
CVE count set to rise by 25% in 2024
Cybersecurity crisis in schools
Videos:
Key areas that will define the intersection of AI and DevOps
Inside the book: Androids – The Team That Built the Android Operating System
Preparing for the NIS2 Directive
Does AI remediation spell the end for developers in 2024?
Escalating cyber threats spark demand for stronger regulations
Industry news:
Collibra AI Governance mitigates risks, protects data, and ensures compliance
Veeam Data Cloud delivers data protection and recovery services on a single cloud platform
Cohesity Gaia helps businesses transform secondary data into knowledge
Exabeam introduces new features to improve security analyst workflows
SpinSPM for Salesforce identifies misconfigurations within SaaS applications
PKI Solutions introduces new version of PKI Spotlight
Akamai extends its segmentation solution to hybrid cloud environments
VIAVI enhances Observer Sentry’s exposure and vulnerability analysis
AU10TIX KYB solution validates info against global registries and jurisdictions
AgileBlue Sapphire AI streamlines SecOps and SOAR processes
Legato Security Ensemble helps organizations prevent breaches
Bitwarden Secrets Manager integrates with Ansible Playbook
Bitdefender Cryptomining Protection detects malicious cryptojacking attempts
NetSTAR PhishCompass combats phishing threats
DataVisor introduces fraud and risk solution for financial institutions
Palo Alto Networks empowers customers with integrated private 5G solutions
Intel Edge Platform simplifies development and management of edge AI apps
McAfee Social Privacy Manager helps users keep their posts and personal information more private
Copyright © 2024 Astus d.o.o. (Help Net Security), All rights reserved.
Want to change how you receive these emails?
You can
update your preferences
or
unsubscribe from this list