Protecting data and other enterprise assets is an increasingly challenging task, and one that touches nearly every corner of an organization. As the complexity of digital systems grows, the challenges mount. One method that helps reign in the chaos is…
Category: Help Net Security
25 cybersecurity AI stats you should know
In this article, you will find excerpts from reports we recently covered, which offer stats and insights into the challenges and cybersecurity issues arising from the expansion of AI. Security pros are cautiously optimistic about AI Cloud Security Alliance and…
Overcoming GenAI challenges in healthcare cybersecurity
In this Help Net Security interview, Assaf Mischari, Managing Partner, Team8 Health, discusses the risks associated with GenAI healthcare innovations and their impact on patient privacy. What are the key cybersecurity challenges in healthcare in the context of GenAI, and…
73% of SME security pros missed or ignored critical alerts
Small and medium-sized enterprises (SMEs) IT staff is overwhelmed by the complexity and demands of managing multiple tools in their security stack, leading them to miss critical severity events and weaken their company’s security posture, according to Coro. The survey…
Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359)
A state-sponsored threat actor has managed to compromise Cisco Adaptive Security Appliances (ASA) used on government networks across the globe and use two zero-day vulnerabilities (CVE-2024-20353, CVE-2024-20359) to install backdoors on them, Cisco Talos researchers have shared on Wednesday. First…
1Kosmos CSP enables government agencies to digitally verify resident identity
1Kosmos has expanded its offerings for the identity verification and passwordless market with the introduction of a new Credential Service Provider (CSP) managed service based on the privacy-by-design 1Kosmos platform. The 1Kosmos CSP offering enables government agencies to offer residents…
Cyberint platform enhancements boost protection against external threats
Cyberint has unveiled a series of platform updates aimed at bolstering client protection against external threats. Cyberint’s recent platform innovations provide several new capabilities that support a range of strategic security initiatives, from regional threat landscape analysis and proactive threat…
Zero Networks unveils identity segmentation solution to prevent credential theft
Zero Networks announced the addition of identity segmentation capabilities within the Zero Networks platform. As stolen credentials remain a top threat facing organizations, this new identity segmentation solution stops privileged account abuse by automatically restricting access to operational needs only.…
PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389)
More details of and a proof-of-concept exploit for an unauthenticated OS command injection vulnerability (CVE-2024-2389) in Flowmon, Progress Software’s network monitoring/analysis and security solution, have been published. The critical vulnerability has been disclosed and patched by Progress earlier this month.…
Comcast Business MDR limits the impact of cyber threats
Comcast Business has expanded its cybersecurity portfolio with the launch of its Comcast Business Managed Detection and Response (MDR) solution. The solution combines an advanced security analytics platform and Security Operations Center (SOC) to help medium and large enterprise customers…
Global attacker median dwell time continues to fall
While the use of zero-day exploits is on the rise, Mandiant’s M-Trends 2024 report reveals a significant improvement in global cybersecurity posture: the global median dwell time – the time attackers remain undetected within a target environment – has reached…
New Relic AI monitoring helps enterprises use AI with confidence
New Relic announced New Relic AI monitoring with a suite of new features to meet the evolving needs of organizations developing AI applications. New features include in-depth AI response tracing insights with real-time user feedback and model comparison to help…
GISEC Global 2024 video walkthrough
In this Help Net Security video, we take you inside GISEC Global, which is taking place from April 23 to April 25, 2024, at the Dubai World Trade Centre. The video features the following vendors: Sophos, Waterfall Security Solutions, UAE…
Secureworks enables users to view known vulnerabilities in the context of threat data
Secureworks announced the ability to integrate vulnerability risk context with threat detection to prevent attackers from exploiting known vulnerabilities and expedite response times, improving an organization’s security posture. The integration between Taegis XDR and Taegis VDR enables customers and partners…
Binarly releases Transparency Platform v2.0 to improve software supply chain security
Binarly releases the Binarly Transparency Platform v2.0 with features for continuous post-build compliance, visibility into the security posture of IoT and XIoT devices, and the ability to identify malicious behavior and hidden backdoors within binaries based on their behavior. Based…
Prophet Security emerges from stealth and raises $11 million
Prophet Security emerged from stealth with $11 million in seed financing led by Bain Capital Ventures (BCV) with participation from several security leaders and angel investors. At the core of the company’s unveiling is Prophet AI for Security Operations, an…
Photos: GISEC Global 2024
GISEC Global is taking place from April 23 to April 25, 2024, at the Dubai World Trade Centre. Here are a few photos from the event, featured vendors include: Waterfall Security Solutions, Netskope, Google Cloud, Huawei, NetSPI, SecureLink, Cloudflare, ITMax…
GenAI can enhance security awareness training
One of the biggest concerns over generative AI is its ability to manipulate us, which makes it ideal for orchestrating social engineering attacks. From mining someone’s digital footprint to crafting highly convincing spear phishing emails, to voice capture enabling vishing…
Cybersecurity jobs available right now: April 24, 2024
Blockchain Security Researcher StarkWare | Israel | On-site – View job details The Security Researcher will be responsible for conducting in-depth research and analysis on the security of blockchain systems, protocols and the infrastructure that enables it. CISO Rajah &…
AI set to play key role in future phishing attacks
A staggering increase in QR code phishing (quishing) attacks during 2023 saw them skyrocket up the list of concerns for cyber teams globally, according to Egress. Attacks were both prolific and highly successful, demonstrating how cybercriminals effectively combine available technology…