Tenable has unveiled enhancements to ExposureAI, the generative AI capabilities and services within its Tenable One Exposure Management Platform. The new features enable customers to quickly summarize relevant attack paths, ask questions of an AI assistant and receive specific mitigation…
Category: Help Net Security
New Relic empowers IT and engineering teams to focus on real application security problems
New Relic launched new capabilities for New Relic IAST (Interactive Application Security Testing), including proof-of-exploit reporting for application security testing. New Relic customers can now identify exploitable vulnerabilities with an ability to reproduce the problem and remediate the specific threat…
DataDome Ad Protect detects fraudulent ad traffic
DataDome launched DataDome Ad Protect, designed to combat fraudulent traffic affecting digital ad campaigns. This solution is set to transform how organizations manage and secure their online advertising efforts, ensuring that marketing budgets are spent effectively and reach genuine audiences.…
Trellix secures sensitive and proprietary information with new protections for macOS
Trellix announced new macOS Trellix Data Loss Prevention Endpoint Complete capabilities to better secure sensitive and proprietary information from accidental or intentional exposure. Global organizations can now protect against critical data leakage via Outlook email, prevent sensitive documents from being…
Regula 4205D updates help border control authorities fight identity document fraud
The International Organization for Migration reports that the migrant flow has been steadily rising, with the numbers swelling from 153 million in 1995 to 281 million in 2022. Concurrently, the quality of counterfeit documents keeps advancing. Under these circumstances, the…
Stellar Cyber and Torq join forces to deliver automation-driven security operations platform
Stellar Cyber announced a technology partnership with Torq to help security teams dramatically improve their ability to combat advanced attacks. This partnership combines the power of Stellar Cyber Open XDR with Torq Hyperautomation, providing security teams with a turnkey integrated…
Nozomi Networks raises $100 million to help secure critical infrastructure
Nozomi Networks announced a $100 million Series E funding round to help accelerate innovative cyber defenses and expand cost-efficient go-to-market expansion globally. This latest round includes investments from Mitsubishi Electric and Schneider Electric. They join a growing list of OT…
Mirantis enhances Lens Desktop to improve Kubernetes operations
Mirantis announced significant updates to Lens Desktop that makes working with Kubernetes easier by simplifying operations, improving efficiency, and increasing productivity. Lens 2024 Early Access is now available to Lens users. Also, Lens adds a new Enterprise subscription tier, providing…
BSAM: Open-source methodology for Bluetooth security assessment
Many wireless headsets using Bluetooth technology have vulnerabilities that may allow malicious individuals to covertly listen in on private conversations, Tarlogic Security researchers have demonstrated last week at RootedCON in Madrid. “Many of the examples presented during the conference were…
LastPass’ CIO vision for driving business strategy, innovation
Recently, LastPass appointed Asad Siddiqui as its CIO. He brings over two decades of experience leading startups and large technology organizations. It was the perfect time for Help Net Security to find out what’s next for Siddiqui in his new…
The most concerning risks for 2024 and beyond
In this Help Net Security video, Melissa Bischoping, Director, Endpoint Security Research at Tanium, discusses the most concerning risks for 2024 and beyond, from both an internal and external perspective. The post The most concerning risks for 2024 and beyond…
Product showcase: How to track SaaS security best practices with Nudge Security
As technology adoption has shifted to be employee-led, IT and security teams are contending with an ever-expanding SaaS attack surface. At the same time, they are often spread thin, meaning they need ways to quickly identify and prioritize the highest-impact…
Keyloggers, spyware, and stealers dominate SMB malware detections
In 2023, 50% of malware detections for SMBs were keyloggers, spyware and stealers, malware that attackers use to steal data and credentials, according to Sophos. Attackers subsequently use this stolen information to gain unauthorized remote access, extort victims, deploy ransomware,…
March 2024 Patch Tuesday: Microsoft fixes critical bugs in Windows Hyper-V
On this March 2024 Patch Tuesday, Microsoft has released fixes for 59 CVE-numbered vulnerabilities, but – welcome news! – none of them are currently publicly known or actively exploited. Last month, though, several days after Patch Tuesday, the company updated…
Aviatrix releases Distributed Cloud Firewall for Kubernetes
Aviatrix introduced Aviatrix Distributed Cloud Firewall for Kubernetes, a distributed cloud networking and network security solution for containerized enterprise applications and workloads. With this solution, Aviatrix bridges the gap between virtual machines (VMs) and Kubernetes (K8s), providing a network security…
Rubrik EPE secures enterprise data from cyberattacks
Artificial intelligence (AI), digital transformation, and the Internet of Things have caused a data explosion, leading organizations to grapple with a surging amount of fragmented data where it lives. Rubrik released Rubrik Enterprise Proactive Edition (EPE), a data security product…
Netskope and Egress partner to enhance behavioral-based threat detection and response
Egress has announced a partnership with Netskope to enhance behavioral-based threat detection and response, transforming the way organizations manage human risk in cloud email. The partnership enables Egress to aggregate Netskope’s User Confidence Index (UCI) as part of its Human…
Claroty Advanced ATD Module provides continuous monitoring of healthcare network risks
Claroty released Advanced Anomaly Threat Detection (ATD) Module within the Medigate Platform from Claroty. The new capability provides healthcare organizations with the clinical context to properly identify, assess, and prioritize threats to connected medical devices, IoT, and building management systems…
Thrive Incident Response & Remediation helps organizations contain and remove threats
Thrive launched Thrive Incident Response & Remediation, an on-demand cybersecurity response service to contain and remove threats, along with engineering assistance to rebuild and restore critical systems. Phishing, ransomware and other cyberattacks put businesses of every size at huge risk…
ZeroFox launches EASM to give customers visibility and control over external assets
ZeroFox has unveiled a new External Attack Surface Management (EASM) module on the ZeroFox platform to see and secure external assets. The new capability builds upon ZeroFox’s existing solutions in Digital Risk Protection and Threat Intelligence, offering a single vendor…