NICE Actimize announces three advanced generative AI-based solutions designed to fight financial crime and allow organizations to significantly reduce the manual and labor-intensive tasks currently employed in financial crime investigations and reporting. Offering up to a 50% reduction in investigation…
Category: Help Net Security
Infoblox SOC Insights reduces critical security operations challenges
Infoblox announced an AI-driven security operations solution, SOC Insights, that boosts its DNS Detection and Response solution, BloxOne Threat Defense. SOC Insights empowers security analysts to jump-start investigations that truly matter and dramatically reduce response time by turning vast amounts…
Bitwarden adds event logs and self-hosting capabilities to its Passwordless.dev toolkit
Bitwarden strengthened its Passwordless.dev enterprise plan with event logs and self-hosting options. These features empower organizations with greater transparency when moving to passwordless authentication and enable developers to build workforce passkey authentication with ease. High demand for enterprise passkey authentication…
Battery maker Varta halts production after cyberattack
German battery manufacturer Varta was forced to shut down its IT systems and stop production as a result of a cyberattack. The Varta cyberattack The cyberattack occurred on Monday night and affected five of the company’s production plants and the…
CPS Insights helps organizations analyze and visualize their healthcare privacy data
CompliancePro Solutions launched their new analytics product, CPS Insights. As a new add-on module to the CompliancePro Privacy Program Management platform, CPS Insights is a vital analytics and visualization tool for operational reporting needs. CPS Insights helps organizations efficiently analyze…
iOS users beware: GoldPickaxe trojan steals your facial data
Group-IB uncovered a new iOS trojan designed to steal users’ facial recognition data, identity documents, and intercept SMS. The trojan, dubbed GoldPickaxe.iOS by Group-IB’s Threat Intelligence unit, has been attributed to a Chinese-speaking threat actor codenamed GoldFactory, responsible for developing…
AI outsourcing: A strategic guide to managing third-party risks
In an era of artificial intelligence (AI) revolutionizing business practices, many companies are turning to third-party AI services for a competitive edge. However, this approach comes with its own set of risks. From data security concerns to operational disruptions, understanding…
Collaboration at the core: The interconnectivity of ITOps and security
In this Help Net Security video, Krista Macomber, Research Director at The Futurum Group, discusses how IT and security teams increasingly unite against cyber threats. Organizations are still struggling with the issue of disjointed data protection solutions, leading to not…
5 free digital forensics tools to boost your investigations
Digital forensics plays a crucial role in analyzing and addressing cyberattacks, and it’s a key component of incident response. Additionally, digital forensics provides vital information for auditors, legal teams, and law enforcement agencies in the aftermath of an attack. Many…
Understanding the tactics of stealthy hunter-killer malware
Picus Security has revealed a rise in hunter-killer malware, highlighting a significant shift in adversaries’ capability to pinpoint and thwart advanced enterprise defenses, including next-gen firewalls, antivirus programs, and EDR systems. There was a 333% increase in malware that can…
AI PC shipments are expected to surpass 167 million units by 2027
Shipments of AI PCs – personal computers with specific system-on-a-chip (SoC) capabilities designed to run generative AI tasks locally – are expected to grow from nearly 50 million units in 2024 to more than 167 million in 2027, according to…
How are state-sponsored threat actors leveraging AI?
Microsoft and OpenAI have identified attempts by various state-affiliated threat actors to use large language models (LLMs) to enhance their cyber operations. Threat actors use LLMs for various tasks Just as defenders do, threat actors are leveraging AI (more specifically:…
Appdome unveils Geo Compliance suite to thwart spoofing and enhance mobile app security
Appdome unveiled its new Geo Compliance feature set, allowing mobile brands to trust the user’s location and detect location spoofing, fake GPS apps, VPN use, SIM swaps and other methods used to circumvent geo restrictions in mobile applications. Mobile brands…
LOKKER introduces a feature to notify users if their website breaches various privacy laws
LOKKER introduces a new feature included in its Privacy Edge software suite. LOKKER now gives companies a solution to monitor and remediate potential web privacy and compliance violations such as HIPAA, the Video Privacy Protection Act (VPPA) and state wiretapping…
Armis acquires CTCI to improve pre-attack threat hunting technology
Armis announced it has agreed to acquire CTCI (Cyber Threat Cognitive Intelligence), a privately held company specializing in AI-powered pre-attack threat hunting technology. In a private deal which closed this week, Armis has acquired all of CTCI technology and employees,…
VicOne xNexus offers contextualized insights into complex attack paths
VicOne announced the xNexus next-generation vehicle security operations center (VSOC) platform. The new solution integrates with VicOne’s in-vehicle VSOC sensor, leveraging a unique LLM approach to provide customized reporting to support VSOC teams. xNexus can provide product security incident response…
Cyberhaven Linea AI protects vital corporate data
Cyberhaven launched Linea AI, an AI platform designed to combat the most critical insider risks threatening vital corporate data. Built to match the collective intelligence of the smartest security analysts, Linea AI applies human-like insight across billions of workflows to…
Akto provides security assessments for GenAI models
About 77% of organizations have adopted or are exploring AI in some capacity, pushing for a more efficient and automated workflow. With the increasing reliance on GenAI models and LLMs like ChatGPT, the need for robust security measures has become…
Resecurity partners with CyberPeace Foundation to address emerging cyber threats
Resecurity and CyberPeace Foundation have joined forces through a Memorandum of Understanding (MoU) to enhance cybersecurity measures worldwide. The collaboration between Resecurity and CyberPeace Foundation marks a significant milestone in the ongoing efforts to combat cyber threats and promote a…
QNAP fixes OS command injection flaws affecting its NAS devices (CVE-2023-47218, CVE-2023-50358)
QNAP Systems has patched two unauthenticated OS command injection vulnerabilities (CVE-2023-47218, CVE-2023-50358) in various versions of the operating systems embedded in the firmware of their popular network-attached storage (NAS) devices. About the vulnerabilities (CVE-2023-47218, CVE-2023-50358) Both vulnerabilities are in the…