In this Help Net Security round-up, experts discuss the importance of embracing AI while implementing protective measures against threats, global AI adoption, consumer perceptions, and behaviors regarding data privacy. Complete videos Tracy Reinhold, CSO at Everbridge, discusses why AI technology…
Category: Help Net Security
Malicious emails trick consumers into false election contributions
Major regional and global events – such as military exercises, political or economic summits, political conventions, and elections – drove cyber threat activities, according to Trellix. “The last six months have been unprecedented – a state of polycrisis remains and…
Week in review: JetBrains GitHub plugin vulnerability, 20k FortiGate appliances compromised
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Users of JetBrains IDEs at risk of GitHub access token compromise (CVE-2024-37051) JetBrains has fixed a critical vulnerability (CVE-2024-37051) that could expose users of its…
Microsoft delays Windows Recall rollout, more security testing needed
Microsoft is delaying the release of Recall, a controversial Windows 11 feature that will allow users to search their computer for specific content that has previously been viewed by them. A preview of Recall should have been broadly available on…
YetiHunter: Open-source threat hunting tool for Snowflake environments
Cloud identity protection company Permiso has created YetiHunter, a threat detection and hunting tool companies can use to query their Snowflake environments for evidence of compromise. YetiHunter executing queries (Source: Permiso Security) Recent attacks against Snowflake customers Cloud-based data storage…
IRONSCALES boosts email security with GPT-powered training feature
IRONSCALES announced its GPT-powered Phishing Simulation Testing solution. This capability, now available to IRONSCALES Complete Protect customers, marks a significant advancement in the ease, efficacy and accessibility of cybersecurity training and awareness. In Verizon’s 2024 Data Breach Investigations Report, researchers…
Oscilar’s AI-powered ACH Fraud Detection identifies and prevents fraudulent transactions
Oscilar released its AI-powered ACH Fraud Detection product. The solution identifies and prevents fraudulent transactions with unparalleled speed and accuracy by leveraging advanced machine learning algorithms, generative AI techniques, and real-time data analysis and explainability. This innovative solution is critical…
CyberLink launches FaceMe Security version 7.15
CyberLink announced the latest release of FaceMe Security. A turnkey security and access control solution, FaceMe Security enables identity verification, attendance management, and access control through AI facial recognition, with real-time monitoring and alerts. FaceMe Security is integrated with major…
The biggest downsides of digital ID adoption
As innovative digital verification methods continue to emerge, the debate around their reliability and effectiveness is heating up, according to Regula. Companies employ various methods for identity verification Despite digital advances, many organizations worldwide still depend on physical documents for…
Modern fraud detection need not rely on PII
Trends in online fraud detection often act as the canary in the coal mine when it comes to understanding and combating the next generation of online scams, fraud and cybersecurity threats. These days, security and fraud experts worry that insufficient…
New infosec products of the week: June 14, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Acronis, Diligent, Entrust, KELA, Plainsea, and SentinelOne. Plainsea: Cybersecurity platform that enables continuous service delivery Designed with managed security service providers in mind, Plainsea offers…
Solving the systemic problem of recurring vulnerabilities
In this Help Net Security video, Dr. Pedram Hayati, CEO at SecDim, and Fil Filiposki, founder of AttackForge, discuss how the two companies have formed a strategic collaboration to tackle the major challenge of resurfacing vulnerabilities. By integrating SecDim’s AppSec…
SailPoint introduces AI-powered application onboarding capability
SailPoint launches innovative AI-powered application onboarding capability. This new capability will be seamlessly integrated into SailPoint Identity Security Cloud and will simplify the process of integrating critical business applications. By automating the onboarding process, SailPoint will simultaneously be delivering faster…
NetSPI acquires Hubble to address asset and exposure management challenges
NetSPI announced its acquisition of Hubble, a Northern Virginia-based cyber asset attack surface management (CAASM) and cybersecurity posture management solution. The integration of Hubble’s Asset Intelligence and CAASM product, Aurora, into The NetSPI Platform will empower security teams to achieve…
PHP command injection flaw exploited to deliver ransomware (CVE-2024-4577)
An OS command injection vulnerability in Windows-based PHP (CVE-2024-4577) in CGI mode is being exploited by the TellYouThePass ransomware gang. Imperva says the attacks started on June 8, two days after the PHP development team pushed out fixes, and one…
Netskope extends security and data protection for Google Workspace users
Netskope has joined the Google Workspace Security Alliance to extend security and data protection for Workspace users. The Netskope One Platform provides a number of advanced security capabilities that protect data, defend against threats, and ensure users have fast and…
Urgently needed: AI governance in cyber warfare
Artificial intelligence is quickly becoming central to societal growth. AI has great power to improve daily life, from education to healthcare, from sustainability to defense. AI also brings to the forefront a number of risks that cut across the core…
Prosimo and Palo Alto Networks join forces to improve cloud infrastructure security
Prosimo announced an integration with Palo Alto Networks for a powerful new approach to security that protects applications and workloads in multi cloud environments. With Prosimo’s Full Stack Cloud Transit platform, customers can seamlessly integrate with Palo Alto Networks VM-Series…
How businesses can integrate token technology into existing payment systems
In this Help Net Security interview, Mark Nelsen, SVP and Global Head of Consumer Product at Visa, discusses the integration of token technology into existing payment systems. How do businesses integrate tokenization into their existing payment systems, and what challenges…
GenAI keeps cybersecurity pros on high alert
“Businesses across every industry face unprecedented challenges posed by an increasing attack surface, zero-day vulnerabilities, cloud misconfigurations, and new emerging threats driven by AI,” said Andrei Florescu, president and GM of Bitdefender Business Solutions Group. “The findings of our recent…