Digitalization has evolved into a systemic risk for organizations – and, therefore, cyber insurers. With the global cost of cybercrime skyrocketing, something has to change. In this Help Net Security video, Vishaal Hariprasad, CEO at Resilience, discusses how cyber insurance…
Category: Help Net Security
Shuffle Automation: Open-source security automation platform
Shuffle is an open-source automation platform designed by and for security professionals. While security operations are inherently complex, Shuffle simplifies the process. It’s designed to integrate with Managed Security Service Providers (MSSPs) and other service providers. Key features Feature-rich workflow…
Ad-injecting malware posing as DwAdsafe ad blocker uses Microsoft-signed driver
ESET Research has discovered a sophisticated Chinese browser injector: a signed, vulnerable, ad-injecting driver from a mysterious Chinese company. This threat, which ESET dubbed HotPage, comes self-contained in an executable file that installs its main driver and injects libraries into…
Week in review: CrowdStrike update causes widespread IT outage, critical Splunk Enterprise flaw
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Faulty CrowdStrike update takes out Windows machines worldwide Thousands and possibly millions of Windows computers and servers worldwide have been made inoperable by a faulty…
Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
The world is 16+ hours into what looks like the biggest IT outage in history, triggered by a defective update for Crowdstrike endpoint security software for Windows machines. The price of both Crowdstrike’s and Microsoft’s shares has tumbled down as…
Update: Worldwide IT outage due to buggy Crowdstrike update
The world is 16+ hours into what looks like the biggest IT outage in history, triggered by a defective update for Crowdstrike endpoint security software for Windows machines. The price of both Crowdstrike’s and Microsoft’s shares has tumbled down as…
Forcepoint GenAI Security prevents unauthorized data sharing
Forcepoint unveils its comprehensive GenAI Security solution, offering visibility, control, and risk-based data protection across generative AI platforms, including integration with OpenAI’s ChatGPT Enterprise Compliance API. Part of Forcepoint’s mission to deliver ‘data security everywhere,’ this solution empowers businesses and…
Netskope extends risk management to OpenAI’s ChatGPT Enterprise
Netskope announced an integration with OpenAI‘s ChatGPT Enterprise Compliance API to deliver API-enabled controls that bolster security and compliance for enterprise organizations using generative AI (genAI) applications. Through this integration with the ChatGPT Enterprise, the Netskope One platform provides organizations…
Faulty CrowdStrike update takes out Windows machines worldwide
Thousands and possibly millions of Windows computers and servers worldwide have been made inoperable by a faulty update of Crowdstrike Falcon Sensors, and the outage affected transport, broadcast, financial, retail and other organizations have been affected in Europe, Australia, the…
One-third of dev professionals unfamiliar with secure coding practices
Attackers consistently discover and exploit software vulnerabilities, highlighting the increasing importance of robust software security, according to OpenSSF and the Linux Foundation. Despite this, many developers lack the essential knowledge and skills to effectively implement secure software development. Lack of…
GenAI network acceleration requires prior WAN optimization
As GenAI models used for natural language processing, image generation, and other complex tasks often rely on large datasets that must be transmitted between distributed locations, including data centers and edge devices, WAN optimization is essential for robust deployment of…
CISOs must shift from tactical defense to strategic leadership
Cyber threats are advancing quickly in size and sophistication, largely because of the rapid evolution of technology, increasing sophistication of cyber attackers, and the expansion of attack surfaces through interconnected systems and devices, according to Ivanti. Ivanti’s research shows that…
New infosec products of the week: July 19, 2024
Here’s a look at the most interesting products from the past week, featuring releases from AuditBoard, BlueVoyant, Druva, Invicti Security, and Rezonate. AuditBoard’s self-assessment tools allow audit teams to maintain focus on their critical work AuditBoard launched out-of-the-box (OOTB) self-assessment…
Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
A recently fixed vulnerability (CVE-2024-36991) affecting Splunk Enterprise on Windows “is more severe than it initially appeared,” according to SonicWall’s threat researchers. Several PoC exploits have been published, including one by IT consultant Mohamed Nabil Ali that performs bulk scanning…
Pindrop secures $100 million to further develop its audio, voice, and AI technologies
Pindrop announced it has secured $100 million in debt financing from Hercules Capital. This significant funding will enable Pindrop to further develop its audio, voice, and AI technologies, enhancing its offerings for customers in the banking, finance, contact center, insurance,…
NTT DATA Edge AI platform accelerates IT/OT convergence
NTT DATA unveiled its new Edge AI platform to accelerate IT/OT convergence by bringing AI processing to the edge. By processing data when and where it is generated and unifying diverse IoT devices, systems and data, this unique, fully managed…
Cerbos Hub simplifies authorization management
Cerbos announced the general availability of Cerbos Hub, following a successful beta phase. Cerbos Hub is a managed Policy Administration Point offering for the popular open source authorization product, Cerbos Policy Decision Point (PDP). Cerbos lets teams provide the right…
SonicWall launches Cloud Secure Edge, suitable for any stage of cloud migration
SonicWall launched Cloud Secure Edge (CSE), offering an innovative suite of Zero Trust Access offerings designed specifically for MSPs who are meeting customers with increasingly remote work forces on their cloud migration journeys. With flexible, cost-effective solutions for remote access…
FIN7 sells improved EDR killer tool
The cybercrime-focused enterprise known as FIN7 (aka the Carbanak group) has come up with yet another trick to assure the effectiveness of its “EDR killer” tool, dubbed AvNeutralizer (i.e., AuKill) by researchers. By leveraging Windows’ built-in driver TTD Monitor Driver…
eBook: How CISSP turns career goals into reality
CISSP carries clout. As the world’s leading cybersecurity certification, it opens many professional opportunities worldwide. Find out what led 14 successful CISSPs around the globe to a career in cybersecurity. They open up about how certification has helped them realize…