Please turn on your JavaScript for this page to function normally.
Cybercrime operation that sold millions of fraudulent Microsoft accounts disrupted

Microsoft disrupted an alleged threat actor group that built viable cybercrime-as-a-service (CaaS) businesses. Dubbed Storm-1152 by Microsoft, the group bilked enterprises and …

GuardRail
GuardRail: Open-source tool for data analysis, AI content generation using OpenAI GPT models

GuardRail OSS is an open-source project delivering practical guardrails to ensure responsible AI development and deployment. GuardRail: Tailored to an organization’s AI needs …

executive
Digital ops and ops management security predictions for 2024

CISOs don’t need a crystal ball – they already know that 2024 will be another tough year, especially with AI at everyone’s mind. Instead of playing catch-up regarding …

predictions
Staying ahead in 2024 with top cybersecurity predictions

What will 2024 hold for the cybersecurity landscape? In this Help Net Security video, Steve Cobb, CISO at SecurityScorecard, offers his take on what professionals can expect …

Microsoft ICS Forensics Tools
Microsoft ICSpector: A leap forward in industrial PLC metadata analysis

Microsoft ICSpector is an open-source forensics framework that enables the analysis of industrial PLC metadata and project files. Architecture The framework provides …

chain
Organizations prefer a combination of AI and human analysts to monitor their digital supply chain

The number of cyber breaches targeting organizations’ supply chains continues to rise, with an average 4.16 breaches reported to be negatively impacting operations this …

arrows
Which cybersecurity controls are organizations struggling with?

How are organizations performing across cybersecurity controls in the Minimum Viable Secure Product (MVSP) framework? A recent analysis by Bitsight and Google reveals some …

privacy
Shifting data protection regulations show why businesses must put privacy at their core

Like it or not, data protection will be one of the biggest issues organizations face in 2024. Knowing where to focus compliance efforts will be tricky, with more and more …

LATMA
A closer look at LATMA, the open-source lateral movement detection tool

In this Help Net Security video, Gal Sadeh, Head of Data and Security Research at Silverfort, discusses LATMA, a free, open-source tool. It’s engineered with advanced …

OT
Industry regulations and standards are driving OT security priorities

When it comes to ransomware attacks, the impact on OT environments is catching up to the impact on IT environments, according to Claroty. In Claroty’s previous survey …

ASPM deep dive
Guide: Application security posture management deep dive

Distinguishing real, business-critical application risks is more challenging than ever. A siloed, ad hoc approach to AppSec generates noisy false positives that overwhelm …

EU
eIDAS: EU’s internet reforms will undermine a decade of advances in online security

The European Union’s attempt to reform its electronic identification and trust services – a package of laws better known as eIDAS 2.0 – contains legislation that poses a grave …

Don't miss

Cybersecurity news