![TruffleHog](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/13134910/trufflehog-1400-400x200.jpg)
TruffleHog: Open-source solution for scanning secrets
TruffleHog is an open-source scanner that identifies and addresses exposed secrets throughout your entire technology stack. “TruffleHog was originally a research tool I …
![API](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/26142001/api3-400x200.jpg)
The importance of a good API security strategy
In 2024, API requests accounted for 57% of dynamic internet traffic around the globe, according to the Cloudflare 2024 API Security & Management Report, confirming that …
![Active Directory](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/16161649/active_directory-1400-400x200.jpg)
Active Directory outages can cost organizations $100,000 per day
Nearly every organization has core systems services tied to Active Directory that will go down during an outage, according to Cayosoft. Consequences of system downtime for …
![US Department of Justice](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/16114335/usa-doj-1400-1-400x200.jpg)
Alleged Raccoon Infostealer operator extradited, verification site set up for victims
A Ukrainian national was extradited to the United States from the Netherlands after being indicted for crimes related to fraud, money laundering, and aggravated identity …
![LockBit takedown](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/20140705/lockbit-takedown-1400-400x200.jpg)
LockBit takedown: Infrastructure disrupted, criminals arrested, decryption keys recovered
In the wake of yesterday’s surprise law enforcement takeover of LockBit’s leak site, the UK National Crime Agency (NCA) and Europol have shared more information …
![LockBit seizure notice](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/20115647/lockbit-seizure-notice-400x200.jpg)
LockBit disrupted by international law enforcement task force
On Monday afternoon, LockBit’s leak site has been taken over by a coalition of law enforcement agencies and is showing a seizure notice that promises more details today, …
![](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/31120944/connectwise-05-400x200.jpg)
Critical ConnectWise ScreenConnect vulnerabilities fixed, patch ASAP!
UPDATE (February 22, 2024, 05:40 a.m. ET): Now designated as CVE-2024-1709 and CVE-2024-1708, the vulnerabilities are under active exploitation. Go here for up-to-date …
![Securities and Exchange Commission](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/31085515/sec1-400x200.jpg)
How to make sense of the new SEC cyber risk disclosure rules
SEC’s new cybersecurity risk management, strategy, governance, and incident disclosure rules, which require increased transparency around cybersecurity incidents, have been in …
![Patrick Harding](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/15142120/patrick_harding-2-ping_identity-1-400x200.jpg)
How decentralized identity is shaping the future of data protection
In this Help Net Security interview, Patrick Harding, Chief Architect at Ping Identity, discusses the promises and implications of decentralized identity (DCI) in …
![GitHub CoPilot](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/15135716/github-copilot-1500-400x200.jpg)
36% of code generated by GitHub CoPilot contains security flaws
Security debt, defined as flaws that remain unfixed for longer than a year, exists in 42% of applications and 71% of organizations, according to Veracode. Worryingly, 46% of …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/09140915/email-1600-400x200.jpg)
Clean links and sophisticated scams mark new era in email attacks
Analysis of 7 billion emails shows clean links are duping users, malicious EML attachments increased 10-fold in Q4, and social engineering attacks are at all-time highs, …
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/16165304/biometrics-1400-400x200.jpg)
Balancing “super app” ambitions with privacy
When Elon Musk’s ambitions to transform X into an “everything app” were divulged last year, he joined several companies known to be exploring or actively working on developing …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?