Certainly: Open-source offensive security toolkit

Certainly is an open-source offensive security toolkit designed to capture extensive traffic across various network protocols in bit-flip and typosquatting scenarios. Built-in protocols: DNS, HTTP(S), IMAP(S), SMTP(S). “The reason... Read more »

Offensive cyber operations are more than just attacks

In this Help Net Security interview, Christopher Jones, Chief Technology Officer and Chief Data Officer at Nightwing, talks about some key misconceptions and complexities surrounding offensive cyber operations. Many... Read more »

Paid open-source maintainers spend more time on security

Paid maintainers are 55% more likely to implement critical security and maintenance practices than unpaid maintainers and are dedicating more time to implementing security practices like those included in... Read more »

The surge in cyber insurance and what it means for your business

The cyber insurance market is set for explosive growth as organizations increasingly seek financial protection against rising cyber threats. This surge in demand reflects a broader shift in how... Read more »

Week in review: Critical VMware vCenter Server bugs fixed, Apple releases iOS 18

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Critical VMware vCenter Server bugs fixed (CVE-2024-38812) Broadcom has released fixes for two vulnerabilities... Read more »

Resecurity joins Cloud Security Alliance to help organizations secure cloud technologies

Resecurity announced that it has joined the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud... Read more »

Opnova emerges from stealth with $3.75 million in funding

Opnova announced its official launch, introducing an agentic AI platform designed to close the automation gap in complex operational workflows. Backed by $3.75 million in pre-seed funding co-led by... Read more »

How to detect and stop bot activity

Bad bot traffic continues to rise year-over-year, accounting for nearly a third of all internet traffic in 2023. Bad bots access sensitive data, perpetrate fraud, steal proprietary information, and... Read more »

Striking the balance between cybersecurity and operational efficiency

In this Help, Net Security interview, Michael Oberlaender, ex-CISO, and book author, discusses how to strike the right balance between security and operational efficiency. Oberlaender advises companies starting their... Read more »

Rising identity security risks: Why organizations must act now

As the priority for managing digital identities intensifies, organizations are encountering severe identity security risks. Recent findings indicate that many businesses are struggling with frequent breaches and inadequate security... Read more »
Subscribe to our Newsletter