Expand your library with these cybersecurity books

In this Help Net Security video round-up, authors discuss their cybersecurity books and provide an inside look at each title. Complete videos George Finney, CSO at Southern Methodist University, talks about his book – “Project Zero Trust: A Story about… Continue reading Expand your library with these cybersecurity books

How exposure management elevates cyber resilience

Attackers are adept at identifying and exploiting the most cost-effective methods of compromise, highlighting the critical need for organizations to implement asset identification and understand their assets’ security posture in relation to the w… Continue reading How exposure management elevates cyber resilience

Drozer: Open-source Android security assessment framework

Drozer is an open-source security testing framework for Android, whose primary purpose is to make the life of mobile application security testers easier. Drozer features The solution enables the identification of security vulnerabilities in application… Continue reading Drozer: Open-source Android security assessment framework

Government organizations’ readiness in the face of cyber threats

Cyber threats targeting government organizations have become increasingly sophisticated, posing significant risks to national security, public infrastructure, and sensitive data. These threats are diverse in nature, originating from various actors such… Continue reading Government organizations’ readiness in the face of cyber threats

The impact of prompt injection in LLM agents

Prompt injection is, thus far, an unresolved challenge that poses a significant threat to Language Model (LLM) integrity. This risk is particularly alarming when LLMs are turned into agents that interact directly with the external world, utilizing tool… Continue reading The impact of prompt injection in LLM agents

CISOs can marry security and business success

With an endless string of cyber fires to be put out, it’s easy to forget that the cybersecurity function in an organization doesn’t exist in a vacuum. Its main purpose is to ensure the organization succeeds, and that’s the reason CISOs get the budget t… Continue reading CISOs can marry security and business success

Alleged Extortioner of Psychotherapy Patients Faces Trial

Prosecutors in Finland this week commenced their criminal trial against Julius Kivimäki, a 26-year-old Finnish man charged with extorting a once popular and now-bankrupt online psychotherapy practice and thousands of its patients. In a 2,200-page report, Finnish authorities laid out how they connected the extortion spree to Kivimäki, a notorious hacker who was convicted in 2015 of perpetrating tens of thousands of cybercrimes, including data breaches, payment fraud, operating a botnet and calling in bomb threats. Continue reading Alleged Extortioner of Psychotherapy Patients Faces Trial

Researchers uncover DarkGate malware’s Vietnamese connection

WithSecure researchers have tracked attacks using DarkGate malware to an active cluster of cybercriminals operating out of Vietnam. DarkGate is a remote access trojan (RAT) that has been used in attacks since at least 2018 and is currently available to… Continue reading Researchers uncover DarkGate malware’s Vietnamese connection

DIY attack surface management: Simple, cost-effective and actionable perimeter insights

Modern-day attack surface management (ASM) can be an intimidating task for most organizations, with assets constantly changing due to new deployments, assets being decommissioned, and ongoing migrations to cloud providers. Assets can be created and for… Continue reading DIY attack surface management: Simple, cost-effective and actionable perimeter insights

WithSecure announces new capabilities to help organizations manage security risks

WithSecure has continued to evolve its Elements cloud-based security platform with the addition of several new capabilities and services that can help organizations manage risks associated with cyber attacks. WithSecure Elements, which can be managed b… Continue reading WithSecure announces new capabilities to help organizations manage security risks