Category: Help Net Security

Vade uses generative AI to enhance spear-phishing detection

Vade announced that it has pioneered a new method that improves the confidence of its spear-phishing detection engine. The enhancement, designed to combat advanced threats including those produced by generative AI, leverages threat samples created by artificial technology and human…

Kentik AI improves network monitoring and observability

Kentik launched Kentik AI to give any engineer, operator, architect, or developer the ability to troubleshoot complex networks. The company is simultaneously launching a modern and AI-assisted Network Monitoring System (Kentik NMS) to enable teams to observe, manage, and optimize…

VikingCloud THOR AI offers real-time interactive analytics

VikingCloud announced THOR AI (Threat Hunting and Orchestrated Response), a generative AI-powered cybersecurity chatbot. The new complimentary cyber defense tool is designed to assist companies of all sizes find more vulnerabilities faster – before they become disruptive threats to their…

Omada introduces real time identity governance

Omada introduced the next generation of Omada Identity Cloud, Horizons. Built on a modern, cloud-native microservice architecture, Omada will deliver speed, intelligent decision support, connectivity and higher operational efficiency. Omada Identity Cloud will deliver enhanced performance for users, with the…

Free ransomware recovery tool White Phoenix now has a web version

White Phoenix is a free ransomware recovery tool for situations where files are encrypted with intermittent encryption. It was tested on BlackCat/ALPHV Ransomware, Play Ransomware, Qilin/Agenda Ransomware, BianLian Ransomware, and DarkBit. Intermittent encryption occurs when ransomware chooses not to encrypt…

Does CVSS 4.0 solve the exploitability problem?

The newest version of the vulnerability scoring system CVSS 4.0 is here! After a lengthy gap between version 3 (released in 2015), as of November 2023 version 4.0 is officially live. Building iteratively on version 3 there are a few…

How to make developers accept DevSecOps

According to a recent Dynatrace report, only 50% of CISOs believe that development teams have thoroughly tested the software for vulnerabilities before deploying it into the production environment. This is a statistic that needs to change and the only way…

Database management enters a new era of complexity

Increasing complexity, the rapid adoption of emerging technologies and a growing skills gap are the biggest concerns facing IT leaders in 2024, according to Redgate. 30% of development teams now deploy database changes to production in a day or less,…