Overcoming legal and organizational challenges in ethical hacking

In this Help Net Security interview, Balázs Pózner, CEO at Hackrate, discusses the essential technical skills for ethical hackers and how they vary across different security domains. He explains how AI and machine learning enhance ethical hacking by st… Continue reading Overcoming legal and organizational challenges in ethical hacking

Product showcase: Augmenting penetration testing with Plainsea

Human-led penetration testing is an essential practice for any organization seeking to proactively address potential attack vectors. However, this indispensable pentesting method is often limited by several factors: high resource demands, project time … Continue reading Product showcase: Augmenting penetration testing with Plainsea

Argus: Open-source information gathering toolkit

Argus is an open-source toolkit that simplifies information gathering and reconnaissance. It features a user-friendly interface and a collection of powerful modules, enabling the exploration of networks, web applications, and security configurations. A… Continue reading Argus: Open-source information gathering toolkit

Spotting AI-generated scams: Red flags to watch for

In this Help Net Security interview, Andrius Popovas, Chief Risk Officer at Mano Bank, discusses the most prevalent AI-driven fraud schemes, such as phishing attacks and deepfakes. He explains how AI manipulates videos and audio to deceive victims and … Continue reading Spotting AI-generated scams: Red flags to watch for

Suricata: Open-source network analysis and threat detection

Suricata is an open-source network intrusion detection system (IDS), intrusion prevention system (IPS), and network security monitoring engine. Suricata features Suricata offers comprehensive capabilities for network security monitoring (NSM), includin… Continue reading Suricata: Open-source network analysis and threat detection

Exclusive: Kevin Mandia joins SpecterOps as chair of the board

The Mandiant founder and Google Cloud adviser tells CyberScoop that he sees a lot of similarities between SpecterOps and the early days of his cybersecurity powerhouse company.

The post Exclusive: Kevin Mandia joins SpecterOps as chair of the board appeared first on CyberScoop.

Continue reading Exclusive: Kevin Mandia joins SpecterOps as chair of the board

Essential metrics for effective security program assessment

In this Help Net Security interview, Alex Spivakovsky, VP of Research & Cybersecurity at Pentera, discusses essential metrics for evaluating the success of security programs. Spivakovsky explains how automation and proactive testing can reveal vul… Continue reading Essential metrics for effective security program assessment

EchoStrike: Generate undetectable reverse shells, perform process injection

EchoStrike is an open-source tool designed to generate undetectable reverse shells and execute process injection on Windows systems. “EchoStrike allows you to generate binaries that, when executed, create an undetectable RevShell, which can be th… Continue reading EchoStrike: Generate undetectable reverse shells, perform process injection