“Malware free” attacks, attackers’ increased reliance on legitimate tools and scripting frameworks, and BEC scams were the most prominent threats small and medium businesses (SMBs) faced in Q3 2023, says the inaugural SMB Threat Report by Huntress, a company that…
Category: Help Net Security
Amazon One Enterprise palm-based identity service improves security of physical spaces, digital assets
AWS announced Amazon One Enterprise, a palm-based identity service for comprehensive and easy-to-use authentication that improves organizational security and helps prevent costly security breaches. The new service enables organizations to provide a fast, convenient, and contactless experience for employees and…
Stop panic buying your security products and start prioritizing
As 2024 is rounding the corner, many companies are making a fresh start with a new cybersecurity budget. But with the growing number of cyberattacks and their increasingly complex nature, even those companies whose cybersecurity budgets have gone up for…
How passkeys are reshaping user security and convenience
In this Help Net Security interview, Anna Pobletts, Head of Passwordless at 1Password, talks about passkey adoption and its acceleration in 2024. This trend is particularly notable among highly-regulated services like fintech and banking, where users seek a sign-in experience…
Guarding the gateway: Securing dispersed networks
The network is at an inflection point, and organizations’ networks have become more dispersed amongst the cloud and on-prem, prompting a greater need for visibility today than ever. As the nature of the network shifts, teams face challenges securing their…
Generative AI security: Preventing Microsoft Copilot data exposure
Microsoft Copilot has been called one of the most powerful productivity tools on the planet. Copilot is an AI assistant that lives inside each of your Microsoft 365 apps — Word, Excel, PowerPoint, Teams, Outlook, and so on. Microsoft’s dream…
Product showcase: New ESET Home Security
ESET is thrilled to announce our new cutting-edge consumer solutions. Our consumer offering is more than just security – it is a comprehensive portfolio designed to keep our customers safe in today’s digital landscape. We are dedicated to advancing technology…
Report: The state of authentication security 2023
This survey set out to explore these challenges, to identify common practices, and to provide insight into how organizations can bolster their defenses. Key findings from the survey include: Current authentication practices Authentication-related cyberattacks Security incidents and impact Password management…
Fortanix Key Insight discovers and remediates data security risks in hybrid multicloud environments
Fortanix announced Key Insight, a new capability in the Fortanix Data Security Manager TM (DSM) platform designed to help enterprises discover, assess, and remediate risk and compliance gaps across hybrid multicloud environments. Data breaches lead to massive monetary losses, hefty…
Veracode’s latest innovations help developers enhance cloud-native security
Veracode announced product innovations to enhance the developer experience. The new features integrate security into the software development lifecycle (SDLC) and drive adoption of application security techniques in the environments where developers work. According to a recent study by analyst…
Trend Companion reduces time spent on manual risk assessments and threat investigations
Trend Micro launched its new generative AI tool, Trend Companion, designed to empower security analysts by driving streamlined workflows and enhanced productivity. “Stretched security operations teams are struggling with the sheer volume and complexity of threat data. Trend Companion is…
Released: AI security guidelines backed by 18 countries
The UK National Cyber Security Centre (NCSC) has published new guidelines that can help developers and providers of AI-powered systems “build AI systems that function as intended, are available when needed, and work without revealing sensitive data to unauthorised parties.”…
Trellix accelerates threat detection and response with GenAI capabilities
Trellix announced its generative artificial intelligence (GenAI) capabilities, built on Amazon Bedrock and supported by Trellix Advanced Research Center. Amazon Bedrock is a fully managed service from AWS making foundation models (FMs) from leading AI companies accessible via an API…
PoC for Splunk Enterprise RCE flaw released (CVE-2023-46214)
A proof-of-concept (PoC) exploit for a high-severity flaw in Splunk Enterprise (CVE-2023-46214) that can lead to remote code execution has been made public. Users are advised to implement the provided patches or workarounds quickly. About CVE-2023-46214 Splunk Enterprise is a…
OpenSSL 3.2.0 released: New cryptographic algorithms, support for TCP fast open, and more!
OpenSSL is a full-featured toolkit for general-purpose cryptography and secure communication. The final version of OpenSSL 3.2.0 is now available. Major changes in OpenSSL 3.2.0 This release incorporates the following potentially significant or incompatible changes: The default SSL/TLS security level…
AWS Kill Switch: Open-source incident response tool
AWS Kill Switch is an open-source incident response tool for quickly locking down AWS accounts and IAM roles during a security incident. The solution includes a Lambda function and proof of concept client. You can either adopt this client or…
Why it’s the perfect time to reflect on your software update policy
The threat landscape is evolving by the minute, with both malicious actors and well-intentioned researchers constantly on the hunt for new attack vectors that bypass security controls and gain control of systems and applications. In fact, thousands of new vulnerabilities…
Security leaders on high alert as GenAI poses privacy and security risks
Companies need help to get visibility into the operations of their AI programs, potentially reducing productivity while creating significant risks around governance, data security, and more. In this Help Net Security video, Neil Cohen, Head of Go-To-Market at Portal26, discusses…
Vulnerability disclosure: Legal risks and ethical considerations for researchers
In this Help Net Security interview, Eddie Zhang, Principal Consultant at Project Black, explores the complex and often controversial world of vulnerability disclosure in cybersecurity. Zhang explores the intricate balancing act that researchers must perform when navigating the interests of…
Building cyber resilience for tomorrow’s threats
Cyber resilience is the capacity of an organization to maintain its core functions and swiftly adapt to, respond to, and recover from cyber threats. A cyber-resilient organization recognizes that cyber threats are inevitable and constantly evolves its strategies to address…