Security News

Low code, high stakes: Addressing SQL injection
2024-06-17 05:00

Reasons include human error, new technologies that lack mature code, and a growing use of open-source code that diminishes control for developers. It's crucial to remember that LCNC apps and RPAs are created by citizen developers, not professional coders, who have little or no understanding of the technical factors underpinning risks.

The rise of SaaS security teams
2024-06-17 04:30

In this Help Net Security interview, Hillary Baron, Senior Technical Director for Research at CSA, highlights that the recent surge in organizations establishing dedicated SaaS security teams is driven by significant data breaches involving widely used platforms. The challenge of securing a SaaS environment demands a multifaceted security strategy and that starts with a strong SaaS security team.

Ghidra: Open-source software reverse engineering framework
2024-06-17 04:00

Ghidra, a cutting-edge open-source software reverse engineering framework, is a product of the National Security Agency Research Directorate. The framework features high-end software analysis tools, enabling users to analyze compiled code across various platforms, including Windows, macOS, and Linux.

Malicious emails trick consumers into false election contributions
2024-06-17 03:30

"The last six months have been unprecedented - a state of polycrisis remains and everything from elections to warfare to law enforcement activity have accelerated cyber threat actor activity globally. We're seeing radical shifts in behavior," said John Fokker, Head of Threat Intelligence, Trellix. China-linked threat groups, like Volt Typhoon, remain the most prolific originator of advanced persistent threat activities, generating 68.3% of all detections.

AI’s impact on data privacy remains unclear
2024-06-17 03:00

Please turn on your JavaScript for this page to function normally. In this Help Net Security round-up, experts discuss the importance of embracing AI while implementing protective measures against threats, global AI adoption, consumer perceptions, and behaviors regarding data privacy.

That didn't take long: replacement for SORBS spam blacklist arises ... sort of
2024-06-17 01:59

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Japan's space junk cleaner hunts down major target
2024-06-17 00:44

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Zero Trust Policy
2024-06-16 16:00

The concept of zero trust implies organizations must work under a constant worst-case scenario. The purpose of this customizable policy, written by Ray Fernandez for TechRepublic Premium, is to provide guidelines for organizations to strengthen their privacy and security postures by implementing an efficient zero trust model.

New ARM 'TIKTAG' attack impacts Google Chrome, Linux systems
2024-06-16 14:16

A new speculative execution attack named "TIKTAG" targets ARM's Memory Tagging Extension to leak data with over a 95% chance of success, allowing hackers to bypass the security feature. The paper, co-signed by a team of Korean researchers from Samsung, Seoul National University, and the Georgia Institute of Technology, demonstrates the attack against Google Chrome and the Linux kernel.

Week in review: JetBrains GitHub plugin vulnerability, 20k FortiGate appliances compromised
2024-06-16 08:00

Users of JetBrains IDEs at risk of GitHub access token compromiseJetBrains has fixed a critical vulnerability that could expose users of its integrated development environments to GitHub access token compromise. AWS unveils new and improved security featuresAt its annual re:Inforce conference, Amazon Web Services has announced new and enhanced security features and tools.