monitoring
![Zeek](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/18165958/zeek-1500-400x200.webp)
Zeek: Open-source network traffic analysis, security monitoring
Zeek is an open-source network analysis framework. Unlike an active security device such as a firewall, Zeek operates on a versatile ‘sensor’ that can be a …
![faking data breaches](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/21135908/faking_data_breaches-1500-400x200.webp)
Why are threat actors faking data breaches?
Earlier this year Europcar discovered a hacker selling info on its 50 million customers on the dark web. The European car rental company immediately launched an investigation, …
![securing video market](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/20104927/securing_video_market-400x200.webp)
Securing the video market: From identification to disruption
Video piracy, a pressing issue often unnoticed in security discussions, is rising and demands immediate attention. In this Help Net Security video, Chris White, Chief …
![Sniffnet](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/31182750/sniffnet-1500-400x200.webp)
Sniffnet: Free, open-source network monitoring
Sniffnet is a free, open-source network monitoring tool to help you easily track your Internet traffic. What sets it apart is its strong focus on user experience. Unlike most …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/07145807/iot-1500-400x200.webp)
Regulators are coming for IoT device security
Cybersecurity is a relatively new challenge for many IoT device makers who have traditionally produced non-connected devices. These devices were less vulnerable to …
![software](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25144120/software-tools-400x200.jpg)
73% of SME security pros missed or ignored critical alerts
Small and medium-sized enterprises (SMEs) IT staff is overwhelmed by the complexity and demands of managing multiple tools in their security stack, leading them to miss …
![Tazama](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/05155253/tazama-open_source-400x200.webp)
Tazama: Open-source real-time fraud management
Tazama is an open-source platform focused on improving fraud management within digital payment systems. Tazama marks a substantial transformation in the approach to financial …
![shield](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093232/shield1-400x200.jpg)
Demystifying SOC-as-a-Service (SOCaaS)
Threat actors aren’t looking for companies of specific sizes or industries, they are looking for opportunities. Given that many companies operate in the dark and overlook …
![OAuth](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/13142631/oauth-400x200.jpg)
3 ways to combat rising OAuth SaaS attacks
OAuth attacks are on the rise. In December, the Microsoft Threat Intelligence team observed threat actors misusing OAuth apps to take over a cloud server and mine …
![internet](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/14190226/internet-global1-400x200.jpg)
Correct bad network behavior to bolster application experience
Legacy hardware-based applications existed happily in isolation, untethered from a network. The thing that really mattered was the speed of the hard drive and having enough …
![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/27101941/genai3-400x200.jpg)
Smaller businesses embrace GenAI, overlook security measures
Organizations are feeling the pressure to rush into generative AI (GenAI) tool usage, despite significant security concerns, according to Zscaler. More than 900 global IT …
![computer code](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/18151023/computer_code2-400x200.png)
Using real-time monitoring to identify and mitigate threats
From identifying unusual behavior patterns to detecting unauthorized access, real-time monitoring provides a view of your digital environment, ensuring that threats are …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege