![Anya Shpilman](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/31122017/anya_shpilman-2-wdigital-400x200.jpg)
Choosing the right partner when outsourcing cybersecurity
In this Help Net Security interview, Anya Shpilman, Senior Executive, Cyber Security Services at WDigital, discusses the benefits and potential risks of outsourcing …
![SOAPHound](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/30175652/soaphound-1400-400x200.jpg)
SOAPHound: Open-source tool to collect Active Directory data via ADWS
SOAPHound is an open-source data collection tool capable of enumerating Active Directory environments through the Active Directory Web Services (ADWS) protocol. How SOAPHound …
![botnet](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/01152202/botnet-1400-2-400x200.jpg)
As-a-Service tools empower criminals with limited tech skills
As-a-service attacks continue to dominate the threat landscape, with Malware-as-a-Service (MaaS) and Ransomware-as-a-Service (RaaS) tools making up the majority of malicious …
![breach](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/07153034/breach-attack-1400-400x200.jpg)
Chinese hackers breached Dutch Ministry of Defense
Chinese state-sponsored hackers have breached the Dutch Ministry of Defense (MOD) last year and deployed a new remote access trojan (RAT) malware to serve as a backdoor. …
![privacy](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11133113/privacy-400x200.jpg)
The fight against commercial spyware misuse is heating up
Though there are organizations out there investigating how commercial spyware is misused to target journalists, human rights defenders and dissidents, the growing market …
![JetBrains TeamCity](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/26135733/jetbrains_teamcity-1400-400x200.jpg)
On-premises JetBrains TeamCity servers vulnerable to auth bypass (CVE-2024-23917)
JetBrains has patched a critical authentication bypass vulnerability (CVE-2024-23917) affecting TeamCity On-Premises continuous integration and deployment servers. About …
![Ivanti](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/31150730/ivanti2-400x200.jpg)
Ivanti Connect Secure flaw massively exploited by attackers (CVE-2024-21893)
CVE-2024-21893, a server-side request forgery (SSRF) vulnerability affecting Ivanti Connect Secure VPN gateways and Policy Secure (a network access control solution), is being …
![cloud security](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/15172500/cloud_security-1400-400x200.jpg)
Common cloud security mistakes and how to avoid them
According to recent surveys, 98% of organizations keep their financial, business, customer and/or employee information in the cloud but, at the same time, 95% of cloud …
![Prowler](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/30191407/prowler-2-1400-400x200.jpg)
Prowler: Open-source security tool for AWS, Google Cloud Platform, Azure
Prowler is an open-source security tool designed to assess, audit, and enhance the security of AWS, GCP, and Azure. It’s also equipped for incident response, continuous …
![Jamieson O'Reilly](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/16114229/jamieson-oreilly-2-dvuln-400x200.jpg)
Enhancing adversary simulations: Learn the business to attack the business
In this Help Net Security interview, Jamieson O’Reilly, Founder of DVULN, discusses adversary simulations, shedding light on challenges rooted in human behavior, …
![cyber threat](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25143233/cyber-threat2-400x200.jpg)
Cybersecurity teams hesitate to use automation in TDIR workflows
Despite reported threat detection, investigation, and response (TDIR) improvements in security operations, more than half of organizations still experienced significant …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194933/password-1-400x200.jpg)
Whitepaper: Why Microsoft’s password protection is not enough
Microsoft’s Azure AD Password Protection, now rebranded as Microsoft Entra ID helps users create a password policy they hope will protect their systems from account takeover …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?