The University Hospital Centre Zagreb (KBC Zagreb) is under cyberattack that started on Wednesday night, the Croatian Radiotelevision has reported. Because of the attack, the hospital has shut down its information system and will be switching parts of it online…
Category: Help Net Security
Lastwall Quantum Shield delivers protection against Q-Day threats
Lastwall launched Quantum Shield, a quantum resilient product that protects conventional network infrastructures with the latest quantum cryptographic standards. Lastwall is backed by Blue Bear Capital, BlueWing Ventures, and 18 West Capital Partners. In light of identity-related incidents continuing to…
Datadog LLM Observability secures generative AI applications
Datadog announced LLM Observability, which allows AI application developers and ML engineers to efficiently monitor, improve and secure large language model (LLM) applications. With LLM Observability, companies can accelerate the deployment of generative AI applications to production environments and scale…
PoC exploit for critical Fortra FileCatalyst flaw published (CVE-2024-5276)
A critical SQL injection vulnerability in Fortra FileCatalyst Workflow (CVE-2024-5276) has been patched; a PoC exploit is already available online. While there’s currently no reports of in-the-wild exploitation, enterprise admins are advised to patch their installations as soon as possible.…
Lattice launches two solutions to help users stay ahead of cyberthreats
Lattice Semiconductor launched two new solutions to address customer challenges around increasing threats to system security. The company announced the Lattice MachXO5D-NX family of advanced secure control FPGAs, offering crypto-agile algorithms, hardware root of trust features with integrated flash, and…
US offers $10 million for information on indicted WhisperGate malware suspect
A federal grand jury in Maryland returned an indictment charging a Russian citizen with conspiracy to hack into and destroy computer systems and data. If convicted, he faces a maximum penalty of five years in prison. The U.S. Department of…
Gitleaks: Open-source solution for detecting secrets in your code
Gitleaks is an open-source SAST tool designed to detect and prevent hardcoded secrets such as passwords, API keys, and tokens in Git repositories. With more than 15 million Docker downloads, 16,200 GitHub stars, 7 million GitHub downloads, thousands of weekly…
New ransomware, infostealers pose growing risk in 2024
BlackBerry detected and stopped 3.1 million cyberattacks (37,000 per day) in the first quarter of 2024. Between January and March 2024, BlackBerry detected 630,000 malicious hashes, representing a 40% increase from its previous reporting period. 60% of attacks targeting industry…
75% of new vulnerabilities exploited within 19 days
Last year alone, over 30,000 new vulnerabilities were published, with a new vulnerability emerging approximately every 17 minutes — averaging 600 new vulnerabilities per week, according to Skybox Security. The report highlights a critical gap in remediation efforts, with the…
Enterprises increasingly turn to cloud and AI for database management
Across various tasks, from predictive analytics to code generation, organizations in all sectors are exploring how AI can add value and increase efficiency. In this Help Net Security video, Ryan Booz, PostgreSQL Advocate at Redgate, discusses the key findings of…
Cofense enhances PhishMe to identify engagement and resilience gaps across all employee levels
Cofense unveiled new enhancements to its PhishMe Employee Security Awareness Training (SAT) Platform. The latest addition, Employee Engagement Index, is set to transform how organizations manage email security risks. The introduction of the Employee Engagement Index (EEI) transforms employees into…
ARMO launches behavioral-based cloud detection and response
ARMO announced its new ARMO Cloud Detection & Response solution, providing robust security for workloads. This new offering addresses the residual threats that may persist during runtime, even after thorough scanning during development and deployment. The solution builds on Kubescape’s…
Malware peddlers experimenting with BPL sideloading and masking malicious payloads as PGP keys
A newly spotted campaign is leveraging BPL sideloading and other uncommon tricks to deliver the IDAT Loader (aka HijackLoader) malware and prevent its detection. The campaign Spotted by Kroll’s incident responders and analyzed by the company’s Cyber Threat Intelligence (CTI)…
Developer errors lead to long-term exposure of sensitive data in Git repos
Credentials, API tokens, and passkeys – collectively referred to as secrets – from organizations around the globe were exposed for years, according to Aqua Security’s latest research. By scanning the most popular 100 organizations on GitHub, which collectively includes more…
Kivu Consulting introduces CyberCertainty Managed XDR
Kivu Consulting has launched CyberCertainty Managed Extended Detection and Response (XDR), the next generation of its managed security service. “The combination of Kivu’s threat expertise along with innovative, leading technology enables us to provide powerful proactive hunting, detective, and response…
Grammarly delivers enhanced security and control features for safer AI use
Grammarly announced an extensive set of new security, deployment, and control features to meet soaring enterprise demand for comprehensive, secure AI communication assistance. Grammarly already serves leading enterprises like Salesforce, Atlassian, Zoom, Expedia Group, Eventbrite, and Siemens. Employees spend a…
Compromised plugins found on WordPress.org
An unknown threat actor has compromised five (and possibly more) WordPress plugins and injected them with code that creates a new admin account, effectively allowing them complete control over WordPress installations / websites. “In addition, it appears the threat actor…
Cybersecurity jobs available right now: June 26, 2024
CISO Influx | Indonesia | Remote – View job details As a CISO, you will be responsible for protecting Influx from information security risks through the development, implementation, and maintenance of our security program (policies, procedures, and standards). Cloud Security…
Future trends in cyber warfare: Predictions for AI integration and space-based operations
In this Help Net Security interview, Morgan Wright, Chief Security Advisor at SentinelOne, discusses how AI is utilized in modern cyber warfare by state and non-state actors. AI enhances decision-making speed and precision for state actors, facilitating the launch of…
B+ security rating masks healthcare supply chain risks
While the healthcare sector gets a “B+” security rating for the first half of 2024, it faces a critical vulnerability: supply chain cyber risk, according to SecurityScorecard. The US healthcare industry’s security ratings were better than expected, with an average…