Help Net Security
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/16094612/week_in_review1-400x200.jpg)
Week in review: Fake ChatGPT desktop client steals data, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Former Uber CSO avoids prison for concealing data breach Joe Sullivan, the …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105342/patch-400x200.jpg)
May 2023 Patch Tuesday forecast: Dealing with End-of-Support (EOS)
The April Patch Tuesday releases were unusual because we saw a whopping 62 vulnerabilities addressed in the Microsoft Server 2012 KBs. Granted there was a lot of overlap with …
![New infosec products of the week](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/13115321/infosec-week-1200-400x200.jpg)
New infosec products of the week: May 5, 2023
Here’s a look at the most interesting products from the past week, featuring releases from Dashlane, Immersive Labs, Intruder, Private AI, Vanta, and Veza. Immersive Labs …
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/13113507/opensource-blue-400x200.jpg)
Universal Data Permissions Scanner: Open-source tool to overcome data authorization blindspots
Satori released Universal Data Permissions Scanner, a free, open-source tool that enables companies to understand which employees have access to what data, reducing the risks …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105446/risk-400x200.jpg)
Organizations brace for cyber attacks despite improved preparedness
Cyber-risk levels have improved from “elevated” to “moderate” for the first time, but insiders represent a persistent threat for global organizations, …
![criminal](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113635/criminal-400x200.png)
Think your data has no value? Scammers disagree
In the first quarter of 2023 there was a significant increase in cyberattacks exploiting trust in established tech brands Microsoft and Adobe, according to Avast. The Avast …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094216/brain-400x200.jpg)
How AI is reshaping the cybersecurity landscape
The success of ChatGPT, a text-generation chatbot, has sparked widespread interest in generative AI among millions of people worldwide. According to Jumio’s research, …
![Amazon Inspector](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/03201307/amazon_inspector-1600-400x200.jpg)
Amazon Inspector allows search of its vulnerability intelligence database
Amazon Inspector is designed to manage vulnerabilities by continuously scanning your AWS workloads for software vulnerabilities and unintended network exposure across your …
![code](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095702/code-magnify-400x200.jpg)
Top API vulnerabilities organizations can’t afford to ignore
75% of organizations typically change or update their APIs on a daily or weekly basis, creating a significant challenge for protecting the changing API attack surface, …
![open source security](https://img.helpnetsecurity.com/wp-content/uploads/2022/04/13072028/open_source_security-400x200.jpg)
Unpaid open source maintainers struggle with increased security demands
Ensuring the security of the open-source software that modern organizations depend on is a crucial responsibility of the open source maintainers, especially as attacks on the …
![API](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/02151220/api-400x200.jpg)
5 API security best practices you must implement
As outside economic pressures continue to shape how organizations think and allocate resources, data security continues to be a high priority. Due to their dependence on data …
![Tython](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/01155350/tython-open_source-1280-400x200.jpg)
Tython: Open-source Security as Code framework and SDK
Development teams utilize automation through Infrastructure as Code (IaC) to facilitate rapid and frequent changes to their cloud-native architectures. Security teams must …
Featured news
Sponsored
Don't miss
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)
- Fighting AI-powered synthetic ID fraud with AI
- Laying the groundwork for zero trust in the military
- Grype: Open-source vulnerability scanner for container images, filesystems
- Signatures should become cloud security history