Security News > 2024 > April

While closed-source password managers don't publicly share their codes for users to modify, open-source password managers do share their codes with a community of users to revise or update over time. Top open-source password managers for Windows comparison table.

Site-wide sales are not an everyday thing, so it would be a shame to miss this opportunity to grab your favorite deals at TechRepublic Academy with an extra 20% discount on the already lowered prices. From April 8th through 11:59 PM Pacific Time on April 16th, TechRepublic Academy is having site-wide sales by offering a 20% additional discount on most deals.

Cybersecurity researchers have discovered an intricate multi-stage attack that leverages invoice-themed phishing decoys to deliver a wide range of malware such as Venom RAT, Remcos RAT, XWorm,...

Threat actors are actively scanning and exploiting a pair of security flaws that are said to affect as many as 92,000 internet-exposed D-Link network-attached storage (NAS) devices. Tracked...

As cyber threats loom around every corner and privileged accounts become prime targets, the significance of implementing a robust Privileged Access Management (PAM) solution can't be overstated....

Understanding an attacker's viewpoint is crucial for pinpointing vulnerabilities, informing security teams where to apply security measures first and what additional security controls are necessary. Without seeing how an attacker can infiltrate the organization, securing an organization becomes a hypothetical task.

It can handle almost anything, and someone once called it the kitchen sink of PKI. With its extensive history as one of the longest-standing CA software projects, EJBCA offers proven robustness, reliability, and adaptability. "EJBCA was created as an open-source project. The first version of the software was released as open source in December 2001. The ability to make a living from working with it and form a good company with many developers working on open source came later when the co-founders of PrimeKey and I realized that it was something we could do," Tomas Gustavsson, the creator of EJBCA, told Help Net Security.

In this Help Net Security interview, Charlotte Wylie, SVP and Deputy CSO at Okta, discusses the challenges of managing user identities across hybrid IT environments. Wylie also highlights strategies for combating password fatigue, integrating IAM solutions, securing operational technology, and establishing identity security policies.

End-user spending on security and risk management will total $215 billion in 2024, according to Gartner. In this Help Net Security video, Nicholas Kathmann, CISO at LogicGate, discusses why companies are turning to a holistic GRC strategy.

Laptop and tablet accessories maker Targus disclosed that it suffered a cyberattack disrupting operations after a threat actor gained access to the company's file servers. Targus is a mobile accessories company known for stylish laptop bags and carrying cases.