Category: Help Net Security

Open-source vulnerability disclosure: Exploitable weak spots

Flaws in the vulnerability disclosure process of open-source projects could be exploited by attackers to harvest the information needed to launch attacks before patches are made available, Aqua Security researchers worry. The risk arises from “half-day” and “0.75-day” vulnerabilities “Half-day”…

Security in the impending age of quantum computers

Quantum computing is poised to be one of the most important technologies of the 21st century. With global governments having collectively pledged more than $38 billion in public funds for quantum technologies and $2.1 billion of new private capital flowing…

Unpacking the challenges of anti-money laundering obligations

When managing anti-money laundering (AML) obligations, many challenger banks turn to basic or unproven in-house risk management solutions. Although these solutions can, in some ways, be innovative, they are often built quickly and lack thorough testing, leading to potential vulnerabilities.…

Tech leaders struggle to keep up with AI advances

New data reveals artificial intelligence is challenging organizations in significant ways, with only 15% of global tech leaders reporting they are prepared for the demands of generative AI and 88% saying stronger regulation of AI is essential, according to Harvey…

Symmetrium releases IM and SMS data protection solution

Symmetrium has unveiled its Instant messaging (IM) and SMS data protection solution, which eliminates the corporate security and compliance risks associated with IM usage by employees. With messaging apps now part of daily life in many workplaces, Hackers can exploit…

Microsoft Authenticator suppresses suspicious MFA notifications

Microsoft has quietly rolled out a new mechanism that shields users of its mobile Authenticator app from suspicious (and annoying) push notifications triggered by attackers. Preventing attacks relying on MFA fatigue When faced with MFA-protected accounts, threat actors repeatedly try…

Elastic simplifies data investigations with piped query language, ES|QL

Elastic has unveiled Elasticsearch Query Language (ES|QL), its new piped query language designed to transform, enrich and simplify data investigation with concurrent processing. ES|QL enables site reliability engineers (SREs), developers and security professionals to perform data aggregation and analysis across…

Druva introduces Azure VM backup and recovery capabilities

Druva announced cloud-native protection for Azure backups, enabling customers to leverage the simplicity and value of SaaS across their cloud deployments. Druva’s 100% agentless, cloud-native SaaS solution provides air-gapped backups for Azure VMs and reduces total cost of ownership by…