WithSecure
![CVE](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/17144547/cve-blue-1500-400x200.webp)
Edge services are extremely attractive targets to attackers
The cyber threat landscape in 2023 and 2024 has been dominated by mass exploitation, according to WithSecure. Edge service KEV vulnerability trends 64% of all edge service and …
![cybersecurity books](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/09195636/cybersecurity_books_2024-1400-400x200.jpg)
Expand your library with these cybersecurity books
In this Help Net Security video round-up, authors discuss their cybersecurity books and provide an inside look at each title. Complete videos George Finney, CSO at Southern …
![cyber resilience](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/20125121/cyber_resilience-400x200.jpg)
How exposure management elevates cyber resilience
Attackers are adept at identifying and exploiting the most cost-effective methods of compromise, highlighting the critical need for organizations to implement asset …
![Drozer](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/29100743/drozer-1500-400x200.webp)
Drozer: Open-source Android security assessment framework
Drozer is an open-source security testing framework for Android, whose primary purpose is to make the life of mobile application security testers easier. Drozer features The …
![government cybersecurity](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/09102406/government_cybersecurity-1400-400x200.jpg)
Government organizations’ readiness in the face of cyber threats
Cyber threats targeting government organizations have become increasingly sophisticated, posing significant risks to national security, public infrastructure, and sensitive …
![large language models](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11160752/llms-2-400x200.jpg)
The impact of prompt injection in LLM agents
Prompt injection is, thus far, an unresolved challenge that poses a significant threat to Language Model (LLM) integrity. This risk is particularly alarming when LLMs are …
![CISO](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/26142020/ciso2-400x200.jpg)
CISOs can marry security and business success
With an endless string of cyber fires to be put out, it’s easy to forget that the cybersecurity function in an organization doesn’t exist in a vacuum. Its main purpose is to …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28082148/malware_fire-400x200.jpg)
Researchers uncover DarkGate malware’s Vietnamese connection
WithSecure researchers have tracked attacks using DarkGate malware to an active cluster of cybercriminals operating out of Vietnam. DarkGate is a remote access trojan (RAT) …
![target](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/25133918/target2-400x200.jpg)
DIY attack surface management: Simple, cost-effective and actionable perimeter insights
Modern-day attack surface management (ASM) can be an intimidating task for most organizations, with assets constantly changing due to new deployments, assets being …
![HNS](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/10093706/hns-2023-large_logo-400x200.jpg)
WithSecure announces new capabilities to help organizations manage security risks
WithSecure has continued to evolve its Elements cloud-based security platform with the addition of several new capabilities and services that can help organizations manage …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/09170820/ai-brain-400x200.jpg)
Emerging threat: AI-powered social engineering
Social engineering is a sophisticated form of manipulation but, thanks to AI advancements, malicious groups have gained access to highly sophisticated tools, suggesting that …
![OT](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11160910/ot-400x200.jpg)
APTs use of lesser-known TTPs are no less of a headache
APT (advanced persistent threat) attacks were once considered to be primarily a problem for large corporations, but the number of these (often state-sponsored) attacks against …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD