![Spoutible](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/06095310/spoutible-1400-400x200.jpg)
Spoutible API exposed encrypted password reset tokens, 2FA secrets of users
A publicly exposed API of social media platform Spoutible may have allowed threat actors to scrape information that can be used to hijack user accounts. The problem with the …
![ResumeLooters](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/06112346/resumelooters-400x200.jpg)
ResumeLooters target job search sites in extensive data heist
Group-IB identified a large-scale malicious campaign primarily targeting job search and retail websites of companies in the Asia-Pacific region. The group, dubbed …
![Mastodon](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/04131130/mastondon-1400-400x200.jpg)
Lagging Mastodon admins urged to patch critical account takeover flaw (CVE-2024-23832)
Five days after Mastodon developers pushed out fixes for a remotely exploitable account takeover vulnerability (CVE-2024-23832), over 66% of Mastodon servers out there have …
![Marco Eggerling](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/16122954/marco_eggerling-2-check_point-400x200.jpg)
How CISOs navigate policies and access across enterprises
In this Help Net Security interview, Marco Eggerling, Global CISO at Check Point, discusses the challenge of balancing data protection with diverse policies, devices, and …
![crypto](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/29115120/crypto-1400-2-400x200.jpg)
3 ways to achieve crypto agility in a post-quantum world
Working at the speed of digital business is a constant challenge. But in today’s increasingly automated operational environment, crypto agility—i.e., an organization’s ability …
![cybersecurity books](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/09195636/cybersecurity_books_2024-1400-400x200.jpg)
10 must-read cybersecurity books for 2024
Our list of cybersecurity books has been curated to steer your professional growth in 2024. This selection aims to provide comprehensive information security insights and …
![cyber resilience](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/20125121/cyber_resilience-400x200.jpg)
Paying ransoms is becoming a cost of doing business for many
Today’s pervasive cyberattacks are forcing the majority of companies to pay ransoms and break their ‘do not pay’ policies, with data recovery deficiencies compounding the …
![video, conference call](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/05153916/video-conference-400x200.jpg)
Deepfaked video conference call makes employee send $25 million to scammers
A deepfake video conference call paired with social engineering tricks has led to the theft of over US$25 million from a multinational firm, the South China Morning Post has …
![AnyDesk](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/03190113/anydesk-1400-400x200.jpg)
AnyDesk has been hacked, users urged to change passwords
AnyDesk Software GmbH, the German company behind the widely used (and misused) remote desktop application of the same name, has confirmed they’ve been hacked and their …
![Latio Application Security Tester](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/29131844/latio-application-security-tester_1400-400x200.jpg)
Latio Application Security Tester: Use AI to scan your code
Latio Application Security Tester is an open-source tool that enables the usage of OpenAI to scan code from the CLI for security and health issues. Features and future plans …
![API](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/02151220/api-400x200.jpg)
Researchers discover exposed API secrets, impacting major tech tokens
Escape’s security research team scanned 189.5 million URLs and found more than 18,000 exposed API secrets. 41% of exposed secrets were highly critical, i.e. could lead to …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/25133914/ai-robot-bot-400x200.jpg)
Businesses banning or limiting use of GenAI over privacy risks
Privacy is much more than a regulatory compliance matter. Findings from a new Cisco study highlight the growing Privacy concerns with GenAI, trust challenges facing …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?