![Jake King](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/24132843/jake_king-2-elastic_security_labs-400x200.webp)
How companies increase risk exposure with rushed LLM deployments
In this Help Net Security interview, Jake King, Head of Threat & Security Intelligence at Elastic, discusses companies’ exposure to new security risks and …
![HNS](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/10093706/hns-2023-large_logo-400x200.jpg)
Elastic’s Search AI to transform SOCs with AI-driven SIEM solutions
Elastic has announced that Search AI will replace the traditional SIEM with an AI-driven security analytics solution for the modern SOC. Powered by the Search AI platform, …
![backdoor](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/02170809/backdoor-2-1500-400x200.webp)
XZ Utils backdoor: Detection tools, scripts, rules
As the analysis of the backdoor in XZ Utils continues, several security companies have provided tools and advice on how to detect its presence on Linux systems. What happened? …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/11083747/malware-1500-400x200.webp)
The most prevalent malware behaviors and techniques
An analysis of 100,000+ Windows malware samples has revealed the most prevalent techniques used by malware developers to successfully evade defenses, escalate privileges, …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100312/biohazard-400x200.jpg)
Pikabot returns with new tricks up its sleeve
After a short hiatus, Pikabot is back, with significant updates to its capabilities and components and a new delivery campaign. About the Pikabot loader Pikabot is a loader …
![open-source cybersecurity tools](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/11131608/open-source-cybersecurity-tools-1400-400x200.jpg)
15 open-source cybersecurity tools you’ll wish you’d known earlier
Open-source tools represent a dynamic force in the technological landscape, embodying innovation, collaboration, and accessibility. These tools, developed with transparency …
![HNS](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/10093706/hns-2023-large_logo-400x200.jpg)
Elastic simplifies data investigations with piped query language, ES|QL
Elastic has unveiled Elasticsearch Query Language (ES|QL), its new piped query language designed to transform, enrich and simplify data investigation with concurrent …
![North Korea](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/03133047/north_korea-flag2-400x200.jpg)
KandyKorn macOS malware lobbed at blockchain engineers
North Korean hackers are using novel MacOS malware named KandyKorn to target blockchain engineers of a cryptocurrency exchange platform. The attack By impersonating blockchain …
![Wazuh](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/22102528/wazuh-1300-400x200.jpg)
Wazuh: Free and open-source XDR and SIEM
Wazuh is an open-source platform designed for threat detection, prevention, and response. It can safeguard workloads in on-premises, virtual, container, and cloud settings. …
![HNS](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/10093706/hns-2023-large_logo-400x200.jpg)
Endace collaborates with Elastic to accelerate cyber threat response
Endace announced a technical partnership with SIEM and observability platform provider Elastic. The partnership brings together the EndaceProbe Scalable Hybrid Cloud Packet …
![Security Onion](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/23114647/security_onion-400x200.jpg)
Security Onion 2.4: Free, open platform for defenders gets huge update
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It has been downloaded over 2 million times and is being …
![shark](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09095053/shark-400x200.jpg)
How 2022’s threats will impact the global landscape in 2023
In this Help Net Security video, Devon Kerr, Team Lead, Elastic Security Labs, talks about the 2023 Global Threat Report Spring edition. Key takeaways In this report, the …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege