Dremio has unveiled AI-powered data discovery capabilities that accelerate and simplify data contextualization and description for analytics, along with improved capabilities that extend its leadership as the analytics engine for Apache Iceberg. Expanding on previously announced Generative AI text-to-SQL capabilities,…
Category: Help Net Security
Delinea Secret Server enhancements increase privileged access management adoption
Delinea announced new features for Secret Server to improve usability and increase PAM adoption across organizations. These enhancements optimize how privileged users interact with the vault through Web Password Filler and Connection Manager, while new capabilities within the Delinea Mobile…
CISA urges water facilities to secure their Unitronics PLCs
News that Iran-affiliated attackers have taken over a programmable logic controller (PLC) at a water system facility in Pennsylvania has been followed by a public alert urging other water authorities to immediately secure their own PLCs. “The cyber threat actors…
Egress unveils graymail detection capability to improve employee productivity
Egress has launched a highly accurate graymail solution, with full end-user control, dedicated to improving employee productivity and reducing the time administrators spend reviewing incorrectly reported phishing emails. The graymail feature is architected into Egress’ inbound threat detection product, Egress…
ThreatNG empowers organizations to identify and mitigate their ransomware risk
ThreatNG Security launched its new Ransomware Susceptibility Assessment, Reporting, and Monitoring Solution. The new solution helps organizations assess their ransomware susceptibility externally and monitor their networks for potential threats. According to the FBI, ransomware attacks increased by 13% in 2022,…
Nitrokey releases NetHSM, a fully open-source hardware security module
German company Nitrokey has released NetHSM 1.0, an open-source hardware security module (HSM). Nitrokey NetHSM 1.0 features The module can be used for storing and managing a variety of cryptographic keys (e.g., keys to enable HTTPS, DNSSEC, secure blockchain transactions,…
SAS collaborates with AWS to help customers unlock more value from their data
SAS has signed a strategic collaboration agreement (SCA) with AWS with plans to help customers extract maximum value and performance from their data in the cloud. SAS now offers SAS Customer Intelligence 360, a highly intelligent customer experience solution, in…
What custom GPTs mean for the future of phishing
OpenAI is putting more power into the hands of users of GenAI, allowing them to create their custom AI agents without writing code. These custom GPTs are the latest leap forward in the rapidly evolving AI landscape, but this highly…
Mosint: Open-source automated email OSINT tool
Mosint is an automated email OSINT tool written in Go designed to facilitate quick and efficient investigations of target emails. It integrates multiple services, providing security researchers with rapid access to a broad range of information. “In my previous job,…
Bridging the risk exposure gap with strategies for internal auditors
In this Help Net Security interview, Richard Chambers, Senior Internal Audit Advisor at AuditBoard, discusses the transformational role of the internal audit function and risk management in helping organizations bridge the gap in risk exposure. He talks about how a…
Infosec products of the month: November 2023
Here’s a look at the most interesting products from the past month, featuring releases from: Action1, Amazon, Aqua Security, ARMO, Datadog, Devo Technology, Druva, Entrust, Enzoic, Fortanix, GitHub, Illumio, Immuta, IRONSCALES, Kasada, Lacework, Malwarebytes, OneSpan, Paladin Cloud, Snappt, ThreatModeler, and…
Organizations can’t ignore the surge in malicious web links
Despite the rising adoption of collaboration and instant messaging software, email remains a significant area of concern regarding cyber attacks, particularly the increasing threat of cybercriminals employing harmful web links in emails, according to Hornetsecurity. Attack techniques used in email…
ManageEngine introduces a dual-layered threat detection system in its SIEM solution, Log360
ManageEngine has unveiled the dual-layered threat detection system in its security information and event management (SIEM) solution, Log360. The new feature, available in Log360’s threat detection, investigation and response (TDIR) component, Vigil IQ, empowers security operations center (SOC) teams in…
1Kosmos enables identity proofing from the web, without downloading a mobile app
1Kosmos announced the 1Kosmos BlockID platform now enables organizations to seamlessly extend web-based identity proofing sessions to a user’s mobile device for scanning government issued documents. This new capability does not require a mobile application, and creates a frictionless web…
FileCloud and Votiro join forces to protect customers from file-borne threats
FileCloud announced a partnership with Votiro to provide customers with options to enhance their security posture. FileCloud is used by leading government and private sector organizations worldwide for secure, compliant file sharing and content collaboration. This partnership shows FileCloud’s commitment…
PoCs for critical Arcserve UDP vulnerabilities released
Arcserve has fixed critical security vulnerabilities (CVE-2023-41998, CVE-2023-41999, CVE-2023-42000) in its Unified Data Protection (UDP) solution, PoCs for which have been published by Tenable researchers on Monday. The vulnerabilities Arcserve UDP is a popular enterprise data protection, backup and disaster…
BlueVoyant acquires Conquest Cyber to help clients mitigate risks while meeting new requirements
BlueVoyant announced the acquisition of Conquest Cyber, a cyber defense company renowned for its innovative SaaS technology that streamlines risk management across an organization’s entire cyber program. Conquest Cyber has proven successful within high-security environments, including the U.S. Defense Industrial…
GuidePoint Security announces Compliance Management as a Service
GuidePoint Security launched Compliance Management as a Service, which will help organizations stay on top of required activities and maintain the necessary data to support future compliance assessments. “While organizations may work intensely to meet certain compliance standards, they are…
Business metrics for Cisco Cloud Observability capability enables customers to protect revenue
Cisco announced new business metrics in Cisco Cloud Observability. Powered by the Cisco Observability Platform to enhance business context for modern applications running on AWS. This latest release also supports integration with AWS services and application performance monitoring (APM) correlation…
Google fixes Chrome zero day exploited in the wild (CVE-2023-6345)
Google has released an urgent security update to fix a number of vulnerabilities in Chrome browser, including a zero-day vulnerability (CVE-2023-6345) that is being actively exploited in the wild. About CVE-2023-6345 CVE-2023-6345, reported by Benoît Sevens and Clément Lecigne of…