Nearly all organizations rely on the cloud to store sensitive data and run critical systems. But for many, cloud security hasn’t kept up. 93% agree that zero-trust segmentation is essential to their cloud security strategy. In this Help Net Security…
Category: Help Net Security
Businesses gain upper hand with GenAI integration
Firms that actively harness generative AI to enhance experiences, offerings, and productivity will realize outsized growth and will outpace their competition, according to Forrester. Between July and September 2023, the number of enterprises that are in the experimentation and expansion…
Kali Linux 2023.4 released: New tools, Kali for Raspberry Pi 5, and more!
OffSec (previously Offensive Security) has released Kali Linux 2023.4, the latest version of its penetration testing and digital forensics platform. New tools in Kali Linux 2023.4 The list of tools freshly added to Kali Linux includes: cabby – a TAXII…
Varonis enhances DSPM capabilities with Azure and AWS support
Varonis Systems has expanded capabilities for cloud databases and object storage in AWS and Azure. This release accelerates customers’ data security posture management (DSPM) initiatives with deeper risk visibility, advanced threat detection, and automated remediation for multi-cloud environments. Varonis’ cloud-native…
Vanta announces new offerings to meet the needs of modern GRC and security leaders
Vanta announced a number of new and upcoming product launches enabling customers to accelerate innovation and strengthen security. The new offerings include advanced Reporting to help security professionals measure the success of their security program and report the impact to…
Securiti collaborates with Databricks to enable the safe use of data and generative AI
Securiti announced its strategic partnership with Databricks. This new partnership will enhance the way enterprises manage their data and AI across all data systems, addressing the growing need for contextual data intelligence and a data command center that consolidates governance,…
CellTrust SL2 Moderator AI prevents data leakage and blocks risky mobile messages
CellTrust introduces SL2 Moderator AI for financial advisors and compliance officers to stop data leakage and block risky mobile messages before they are sent to clients. “It is no longer enough to just capture and provide data to compliance departments…
Russian hackers use old Outlook vulnerability to target Polish orgs (CVE-2023-23397)
Russian state-backed hacking group Forest Blizzard (aka Fancy Bear, aka APT28) has been using a known Microsoft Outlook vulnerability (CVE-2023-23397) to target public and private entities in Poland, Polish Cyber Command has warned. Compromising email accounts and maintaining access to…
Stytch offers toolkit for developers to build, implement, and customize passkey-based authentication
Stytch announced its Passkeys offering, giving developers the easiest way to build, customize and maintain passkey-based authentication in their applications. Stytch’s new solution offers a flexible, API-first approach to passkeys that abstracts the complexity of cross-platform implementation while maintaining guardrails…
MixMode platform enhancements boost threat detection and response
MixMode announced its quarterly product release. This release gives customers greater visibility into their digital attack surface, improved investigation capabilities, and increased customization options. Key features and enhancements include: Alert enrichment enhancements: MixMode’s alert enrichments have been significantly enhanced to…
Veeam Data Platform 23H2 update enhances resilience against ransomware
Veeam Software released new Veeam Data Platform 23H2 update, including Veeam Backup & Replicationv12.1 release as well as Veeam ONE v12.1 and Veeam Recovery Orchestrator v7. This latest release from Veeam, with a focus on radical resilience, includes hundreds of…
Global Integrity QTel protects voice, messaging, and video conversations
Global Integrity announced the newest version of the company’s secure communications solution, QTel, which offers advanced features and stronger encryption. Formerly Qphone, the new QTel provides a unique approach that ensures security and privacy of all voice, messaging, and video…
Rambus launches Quantum Safe Engine for data center and government hardware security
Rambus has unveiled the availability of a Quantum Safe Engine (QSE) for integration into hardware security elements in ASICs, SoCs and FPGAs. Quantum computers will enable adversaries to break current asymmetric encryption, placing important data and assets at risk. The…
Resecurity and ICS Technologies join forces to improve cybersecurity in Iraq
Resecurity and ICS Technologies IRAQ, a well-established ICT System Integration Company with HQ in Baghdad, Iraq, have joined forces to fortify cybersecurity, fraud prevention and risk intelligence measures nationwide. This strategic partnership is poised to bring intelligence-driven defensive solutions to…
How AI is revolutionizing “shift left” testing in API security
Catching coding errors in API preproduction, before they are spun up and go live is critical in preventing exploitable vulnerabilities. It’s why we’ve seen “shift left” become a significant focus in API development, whereby DevOps takes responsibility for incorporating security…
SessionProbe: Open-source multi-threaded pentesting tool
SessionProbe is a multi-threaded pentesting tool designed to evaluate user privileges in web applications. It takes a user’s session token and checks for a list of URLs if access is possible, highlighting potential authorization issues. It deduplicates URL lists and…
Advanced ransomware campaigns expose need for AI-powered cyber defense
In this Help Net Security interview, Carl Froggett, CIO at Deep Instinct, discusses emerging trends in ransomware attacks, emphasizing the need for businesses to use advanced AI technologies, such as deep learning (DL), for prevention rather than just detection and…
Exploring the impact of generative AI in the 2024 presidential election
2024 is a presidential election year in the US. 2016 and 2020 both saw impressive increases in attempts to influence voters through crafty propaganda and social media campaigns run by bots and expert social engineers, along with attempts to influence…
eBook: Defending the Infostealer Threat
Enterprises’ increasing digital reliance has fueled an array of cybersecurity threats. One rapidly growing area is information-stealing malware known as infostealers, which is malicious software designed to steal data. Unlike ransomware, where information is held hostage, infostealer attacks happen covertly,…
2024 brings changes in data security strategies
2024 will be a revolutionary year for the data security landscape as Data Security Posture Management (DSPM) technology rapidly evolves to keep pace with the colossal amount of data being created, stored and shared within organizations and across business sectors,…