Vade announced that it has pioneered a new method that improves the confidence of its spear-phishing detection engine. The enhancement, designed to combat advanced threats including those produced by generative AI, leverages threat samples created by artificial technology and human…
Category: Help Net Security
A zero-day vulnerability (and PoC) to blind defenses relying on Windows event logs
A zero-day vulnerability that, when triggered, could crash the Windows Event Log service on all supported (and some legacy) versions of Windows could spell trouble for enterprise defenders. Discovered by a security researcher named Florian and reported to Microsoft, the…
Experian Fraud Protect enables automotive dealers to detect and prevent fraud
With more of the vehicle buying journey shifting online and vehicle prices remaining at elevated levels, fraudsters are targeting the automotive industry at an increasing rate. To address the rising threat, Experian launched Fraud Protect, a web-based application that helps…
Kentik AI improves network monitoring and observability
Kentik launched Kentik AI to give any engineer, operator, architect, or developer the ability to troubleshoot complex networks. The company is simultaneously launching a modern and AI-assisted Network Monitoring System (Kentik NMS) to enable teams to observe, manage, and optimize…
VikingCloud THOR AI offers real-time interactive analytics
VikingCloud announced THOR AI (Threat Hunting and Orchestrated Response), a generative AI-powered cybersecurity chatbot. The new complimentary cyber defense tool is designed to assist companies of all sizes find more vulnerabilities faster – before they become disruptive threats to their…
Jetico updates BCWipe Total WipeOut to meet the NIST hard drive wipe requirements
Jetico released an update of BCWipe Total WipeOut. Addressing concerns of meeting the NIST hard drive wipe requirements, the new version of the software allows users to erase hard drive data and follow the guidelines in a single click. The…
Omada introduces real time identity governance
Omada introduced the next generation of Omada Identity Cloud, Horizons. Built on a modern, cloud-native microservice architecture, Omada will deliver speed, intelligent decision support, connectivity and higher operational efficiency. Omada Identity Cloud will deliver enhanced performance for users, with the…
Aim Security raises $10 million to unlock the full potential of GenAI technology
Aim Security announced $10 million in seed funding, led by YL Ventures, with participation from CCL (Cyber Club London), the founders of WIZ and angel investors from Google, Proofpoint and Palo Alto Networks. Aim Security was founded by cybersecurity veterans…
ProcessUnity unveils all-in-one platform for third-party risk management
ProcessUnity announced the completed integration of the Global Risk Exchange, making it the all-in-one risk platform for modernizing TPRM (Third-party risk management). Now, via a single combined offering, risk executives can positively transform their TPRM program from labor intensive, static…
Veza integrates with Google Drive to secure access to enterprise files
Veza announced an integration with Google Drive, the popular file storage and synchronization service. With this integration, Veza customers can now secure access to files like docs and spreadsheets that are stored in Google Drive. Identity is the primary avenue…
Free ransomware recovery tool White Phoenix now has a web version
White Phoenix is a free ransomware recovery tool for situations where files are encrypted with intermittent encryption. It was tested on BlackCat/ALPHV Ransomware, Play Ransomware, Qilin/Agenda Ransomware, BianLian Ransomware, and DarkBit. Intermittent encryption occurs when ransomware chooses not to encrypt…
Does CVSS 4.0 solve the exploitability problem?
The newest version of the vulnerability scoring system CVSS 4.0 is here! After a lengthy gap between version 3 (released in 2015), as of November 2023 version 4.0 is officially live. Building iteratively on version 3 there are a few…
Proactive cybersecurity: A strategic approach to cost efficiency and crisis management
In this Help Net Security interview, Stephanie Hagopian, VP of Security at CDW, discusses offensive strategies in the face of complex cyberattacks and the role of the zero-trust model. The conversation also covers the essential steps for a reactive cybersecurity…
How to make developers accept DevSecOps
According to a recent Dynatrace report, only 50% of CISOs believe that development teams have thoroughly tested the software for vulnerabilities before deploying it into the production environment. This is a statistic that needs to change and the only way…
Database management enters a new era of complexity
Increasing complexity, the rapid adoption of emerging technologies and a growing skills gap are the biggest concerns facing IT leaders in 2024, according to Redgate. 30% of development teams now deploy database changes to production in a day or less,…
Cybercriminals replace familiar tactics to exfiltrate sensitive data
Ransomware attacks are increasing again as cybercriminals’ motivation shifts to data exfiltration, according to Delinea. The familiar tactics of crippling a company and holding it hostage have been replaced by new strategies that use stealth to exfiltrate private and sensitive…
Siren launches AI-Powered search with mobile access for front line officers
Siren has launched a new AI-Powered search with mobile access as part of its latest release and its Siren for Law Enforcement product bundle. Siren provides a complete suite of investigation tools for contemporary challenges such as police vetting, “Smash…
SentinelOne unveils threat hunting capabilities in its WatchTower and WatchTower Pro
Organizations today face a relentless pace of sophisticated cyber attacks that they must be able to swiftly detect and neutralize to keep their assets and infrastructure safe. But many lack the time and resources to pull this off. To help…
NordVPN Link Checker protects users from malicious websites
NordVPN launches its new experimental product from the NordLabs platform. Link Checker is a manual URL-checking tool that enables users to examine a website’s safety before visiting by scanning it for different types of malware and getting a notification about…
Self-managed GitLab installations should be patched again (CVE-2024-0402)
Less than two weeks after having plugged a security hole that allows account takeover without user interaction, GitLab Inc. has patched a critical vulnerability (CVE-2024-0402) in GitLab CE/EE again and is urging users to update their installations immediately. GitLab Inc.…