New DarkGate Malware Campaign Hits Companies Via Microsoft Teams

Get technical details about how this new attack campaign is delivered via Microsoft Teams and how to protect your company from this loader malware. Read more »

The rise and evolution of supply chain attacks

A supply chain attack is a cyberattack that focuses on a third-party supplier providing essential services or software to the supply chain. In this Help Net Security video, Dick... Read more »

Windows 10 and 11 in S Mode: What Is It and Should You Use It?

Windows in S mode is a setting that prioritizes security and performance by allowing only apps from the Microsoft Store and restricting access to the command line, so it... Read more »

Dreamforce 2023: Salesforce Expands Einstein AI and Data Cloud Platform

The Einstein 1 platform links Salesforce CRM data and generative AI. Plus, Trust Layer allows organizations to have control over their own data. Read more »

Shifting left and right, innovating product security

In this Help Net Security interview, Slava Bronfman, CEO at Cybellum, discusses approaches for achieving product security throughout a device’s entire lifecycle, fostering collaboration across business units and product... Read more »

Reaper: Open-source reconnaissance and attack proxy workflow automation

Reaper is an open-source reconnaissance and attack proxy, built to be a modern, lightweight, and efficient equivalent to Burp Suite/ZAP. It focuses on automation, collaboration, and building universally distributable... Read more »

Trojanized Signal, Telegram apps found on Google Play, Samsung Galaxy Store

ESET researchers have identified two active campaigns targeting Android users, where the threat actors behind the tools for Telegram and Signal are attributed to the China-aligned APT group GREF.... Read more »

RFP Templates and Guidebook

A request for proposal is a common method for soliciting vendor quotes and answers about potential product or service offerings. They specifically intend to gather details involving implementation, operations... Read more »

The power of passive OS fingerprinting for accurate IoT device identification

The number of IoT devices in enterprise networks and across the internet is projected to reach 29 billion by the year 2030. This exponential growth has inadvertently increased the... Read more »

What does optimal software security analysis look like?

In this Help Net Security interview, Kevin Valk, co-CEO at Codean, discusses the consequences of relying solely on automated tools for software security. He explains how these tools can... Read more »
Subscribe to our Newsletter