Security News

Orbit: Open-source Nuclei security scanning and automation platform
2025-02-17 05:30

Orbit is an open-source platform built to streamline large-scale Nuclei scans, enabling teams to manage, analyze, and collaborate on security findings. It features a SvelteKit-based web frontend...

Scaling penetration testing through smart automation
2025-01-08 05:00

In this Help Net Security interview, Marko Simeonov, CEO of Plainsea, discusses how organizations can move beyond compliance-driven penetration testing toward a more strategic, risk-based...

reconFTW: Open-source reconnaissance automation
2024-12-30 05:00

reconFTW is an open-source tool that simplifies and automates the reconnaissance process, delivering subdomain enumeration, vulnerability assessment, and gathering intelligence about a target....

Top 5 Cloud Security Automations for SecOps Teams
2024-10-17 14:02

Learn about 5 powerful cloud security automations with Blink Ops to simplify security operations like S3 bucket monitoring, subdomain takeover detection and failed EC2 login detection. [...]

Strengthen your cybersecurity with automation
2024-10-16 08:38

Find out how to enhance efficiency using Google Security Operations Webinar In an era of ever-evolving cyber threats, staying ahead of potential security risks is essential.…

Enhancing firewall management with automation tools
2024-10-02 05:00

In this Help Net Security interview, Raymond Brancato, CEO at Tufin, discusses the considerations organizations must weigh when selecting a next-generation firewall to effectively balance security...

4 Top Security Automation Use Cases: A Detailed Guide
2024-09-18 14:01

Learn about the top 4 security automation use cases that can streamline your cybersecurity efforts. This guide covers reducing enriching indicators of compromise (IoCs), monitoring external attack...

How human-led threat hunting complements automation in detecting cyber threats
2024-09-10 04:00

In this Help Net Security interview, Shane Cox, Director, Cyber Fusion Center at MorganFranklin Consulting, discusses the evolving methodologies and strategies in threat hunting and explains how...

AI for application security: Balancing automation with human oversight
2024-08-20 04:00

To truly harness the most benefit from AI in application security, security professionals should adopt an application-centric approach that automates change management processes, identifies security risks, and ensures compliance. AI's limitations in application security stem from the need for high-quality data to train AI models and the significant possibility of false positives at scale.

Critical Flaw in Rockwell Automation Devices Allows Unauthorized Access
2024-08-05 06:07

A high-severity security bypass vulnerability has been disclosed in Rockwell Automation ControlLogix 1756 devices that could be exploited to execute common industrial protocol programming and configuration commands. "A vulnerability exists in the affected products that allows a threat actor to bypass the Trusted Slot feature in a ControlLogix controller," the U.S. Cybersecurity and Infrastructure Security Agency said in an advisory.