Security News

New Case Study: Unmanaged GTM Tags Become a Security Nightmare
2024-06-19 11:03

Are your tags really safe with Google Tag Manager? If you've been thinking that using GTM means that your tracking tags and pixels are safely managed, then it might be time to think again. In this...

SELKS: Open-source Suricata IDS/IPS, network security monitoring, threat hunting
2024-06-19 04:30

SELKS is a free, open-source, turnkey solution for Suricata-based network intrusion detection and protection, network security monitoring, and threat hunting. Since all the data in SELKS is generated by the Suricata engine, it is popular among network security practitioners who explore the capabilities of Suricata IDS/IPS/NSM and analyze the network protocol monitoring logs and alerts it generates.

What Is Zero Trust Security?
2024-06-18 16:00

In today’s dynamic threat environment, traditional security perimeters are proving to be increasingly vulnerable. Ray Fernandez, writing for TechRepublic Premium, presents an in-depth exploration...

CHERI Alliance formed to promote memory security tech ... but where's Arm?
2024-06-18 15:04

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Medibank breach: Security failures revealed (lack of MFA among them)
2024-06-18 14:22

The 2022 Medibank data breach / extortion attack perpetrated by the REvil ransomware group started by the attackers leveraging login credentials stolen from a private computer of an employee of a Medibank's IT contractor. According to a statement by the Australian Information Commissioner filed with the Federal Court of Australia, the credentials were stolen by way of infostealer malware, after that employee "Saved his Medibank username and password for a number of Medibank accounts to his personal internet browser profile on the work computer he used to provide IT services to Medibank", and then signed into his internet browser profile on his personal computer.

The Annual SaaS Security Report: 2025 CISO Plans and Priorities
2024-06-18 11:23

Seventy percent of enterprises are prioritizing investment in SaaS security by establishing dedicated teams to secure SaaS applications, as part of a growing trend of maturity in this field of...

How to create your cybersecurity “Google Maps”: A step-by-step guide for security teams
2024-06-18 05:00

Just like Google Maps revolutionized navigation, process mapping can revolutionize how you understand and manage your security landscape. Today most teams are navigating the streets of cybersecurity with the equivalent of paper maps.

Enhancing security through collaboration with the open-source community
2024-06-18 04:30

In this Help Net Security interview, Alan DeKok, CEO at NetworkRADIUS, discusses the need for due diligence in selecting and maintaining open-source tools, and brings out the potential risks and benefits of collaborating with the open-source community to enhance software security. Un-vetted open-source tools can certainly reduce system security.

42% plan to use API security for AI data protection
2024-06-18 03:00

Data maturity poses a bigger AI implementation challenge. At the data layer, data maturity is a more immediate and potentially bigger challenge impacting the widespread implementation of AI. 72% of study respondents cite data quality and an inability to scale data practices as the top hurdles to scaling AI, and 53% cite the lack of AI and data skillsets as a major impediment.

Arm security defense shattered by speculative execution 95% of the time
2024-06-18 01:11

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.