Please turn on your JavaScript for this page to function normally.
Beelzebub
Beelzebub: Open-source honeypot framework

Beelzebub is an open-source honeypot framework engineered to create a secure environment for detecting and analyzing cyber threats. It features a low-code design for seamless …

Oliver Friedrichs
The overlooked risks of poor data hygiene in AI-driven organizations

In this Help Net Security interview, Oliver Friedrichs, CEO at Pangea, discusses why strong data hygiene is more important than ever as companies integrate AI into their …

OpenNHP
OpenNHP: Cryptography-driven zero trust protocol

OpenNHP is the open-source implementation of NHP (Network-resource Hiding Protocol), a cryptography-based zero trust protocol for safeguarding servers and data. OpenNHP offers …

Benjamin Racenberg
What you can do to prevent workforce fraud

In this Help Net Security interview, Benjamin Racenberg, Senior Intelligence Services Manager at Nisos, discusses the threat of workforce fraud, particularly DPRK-affiliated …

Rob Lee
The hidden dangers of a toxic cybersecurity workplace

In this Help Net Security interview, Rob Lee, Chief of Research and Head of Faculty at SANS Institute, discusses what a toxic environment looks like and how professionals can …

BadDNS
BadDNS: Open-source tool checks for subdomain takeovers

BadDNS is an open-source Python DNS auditing tool designed to detect domain and subdomain takeovers of all types. BadDNS modules cname – Check for dangling CNAME records …

Jags Kandasamy
Deploying AI at the edge: The security trade-offs and how to manage them

Deploying AI at the edge brings advantages such as low latency, improved efficiency, and real-time decision-making. It also introduces new attack surfaces. Adversaries could …

Sean Cordero
Zscaler CISO on balancing security and user convenience in hybrid work environments

In this Help Net Security interview, Sean Cordero, CISO at Zscaler, talks about securing hybrid work and the new challenges it presents to cybersecurity teams. He discusses …

ExtensionHound
ExtensionHound: Open-source tool for Chrome extension DNS forensics

Traditional monitoring tools reveal only traffic from the Chrome process, leaving security teams uncertain about which extension is responsible for a suspicious DNS query. …

James Mirfin
Preparing financial institutions for the next generation of cyber threats

In this Help Net Security interview, James Mirfin, SVP and Head of Risk and Identity Solutions at Visa, discusses key priorities for leaders combating fraud, the …

BloodyAD
BloodyAD: Open-source Active Directory privilege escalation framework

BloodyAD is an open-source Active Directory privilege escalation framework that uses specialized LDAP calls to interact with domain controllers. It enables various privilege …

Gerald Beuchelt
Acronis CISO on why backup strategies fail and how to make them resilient

In this Help Net Security interview, Gerald Beuchelt, CISO at Acronis, discusses common backup strategy pitfalls, reasons for backup failures, and offers actionable advice for …

Don't miss

Cybersecurity news