AppOmni unveiled a groundbreaking advancement with the introduction of AskOmni. This AI-powered SSPM assistant developed by the AppOmni OmniScience team propels SSPM into new dimensions, simplifying security operations and issue remediation, and helping organizations secure mission-critical SaaS environments. AskOmni simplifies…
Category: Help Net Security
8220 gang exploits old Oracle WebLogic vulnerability to deliver infostealers, cryptominers
The 8220 gang has been leveraging an old Oracle WebLogic Server vulnerability (CVE-2020-14883) to distribute malware, the Imperva Threat Research team has found. About 8220 Active since 2017, the 8220 gang has been known for deploying cryptocurrency miners on Linux…
ConnectSecure announces improved cybersecurity scanning platform for MSPs
ConnectSecure announced it will launch the much-anticipated Version 4.0 of its flagship cybersecurity scanning platform by the end of the year. This release marks a significant leap in the technology, offering efficiency and security management for MSPs globally. Revolutionizing cybersecurity…
Codenotary Trustcenter 4.0 helps customers prioritize and address software security issues
Codenotary announced Trustcenter 4.0 with sophisticated capabilities to manage data in the VEX (Vulnerability Exploitability eXchange) format with a newly-designed search engine guided by ML. With the latest Trustcenter, vulnerability information contained in VEX can be analyzed more effectively, enabling…
Halcyon raises $40 million to combat ransomware attacks
Halcyon announced it has closed a $40 million Series B funding round led by Bain Capital Ventures (BCV). The company also announced that BCV Partner and former Symantec CEO, Enrique Salem, will join the Board of Directors, and BCV Partner…
Citrix Bleed leveraged to steal data of 35+ million Comcast Xfinity customers
Telecommunications company Comcast has confirmed a breach that exposed personal information of more than 35.8 million of Xfinity customers. Exploiting Citrix Bleed to breach Xfinity CVE-2023-4966 (aka Citrix Bleed) – an information disclosure vulnerability in Citrix NetScaler ADC/Gateway devices –…
Argus vDome prevents cyber vehicle theft
Argus Cyber Security unveiled its Argus vDome product, an anti-theft solution focused on protecting vehicles from CAN injection attacks. Car theft is shifting from low-tech to high-tech. CAN injection attacks, for example, exploit vulnerabilities in a vehicle’s CAN bus to…
SimSpace raises $45 million to fuel continued growth
SimSpace has closed a $45 million equity raise led by L2 Point Management, a private investment firm specializing in flexible capital solutions for growth companies. This investment brings the total capital raised by SimSpace over the past year to $70…
AI’s efficacy is constrained in cybersecurity, but limitless in cybercrime
Bringing artificial intelligence into the cybersecurity field has created a vicious cycle. Cyber professionals now employ AI to enhance their tools and boost their detection and protection capabilities, but cybercriminals are also harnessing AI for their attacks. Security teams then…
Product showcase: ImmuniWeb AI Platform
ImmuniWeb is a global application security company that currently serves over 1,000 customers from more than 50 countries. ImmuniWeb AI Platform has received numerous prestigious awards and industry recognitions for intelligent automation and acceleration of application security testing, which delivers…
Supply chain emerges as major vector in escalating automotive cyberattacks
In this Help Net Security video, Jay Yaneza, Cybersecurity Architect at VicOne, discusses how, in the first half of the year, cyberattacks on the automotive sector caused losses exceeding $11 billion. These attacks mainly targeted automotive suppliers, not OEMs, showing…
Balancing AI’s promise with privacy and intellectual property concerns
Organizations increasingly integrate AI technologies into their cybersecurity architectures to enhance detection, response, and mitigation capabilities. One of the key strengths of AI in cybersecurity lies in its ability to predict and prevent attacks before they occur. Powered by AI,…
Subdominator: Open-source tool for detecting subdomain takeovers
Subdominator is a dependable and fast open-source command-line interface tool to identify subdomain takeovers. It boasts superior accuracy and reliability, offering improvements compared to other tools. “Initially, Subdominator was created internally because all the current subdomain takeover tools had gaps…
Law enforcement seizes ALPHV/Blackcat sites, offers decryptor to victims
The US Justice Department announced today a disruption campaign against the Blackcat/ALPHV ransomware group and let victims know that there is a decryptor they can use. FBI develops ALPHV/Blackcat decryptor Over the past 18 months, ALPHV/Blackcat has emerged as the…
Wiz and Apiiro partner to provide context-driven security from code to cloud
Apiiro, a leading application security posture management (ASPM) solution, today announced its partnership with Wiz, the leading cloud security company and Cloud Native Application Protection Platform (CNAPP) provider. By joining Wiz Integrations (WIN), Apiiro brings the power of deep ASPM…
Fortinet enhances its OT security solutions and services
Fortinet announced the latest release of new, integrated operational technology (OT) security solutions and services. These additions further distance Fortinet’s industry-leading OT Security Platform from the rest of the market. “We understand that OT differs significantly from traditional IT systems,…
Hexnode offers patch management for Windows devices
Hexnode launched Windows Patch Management (OS Update and Upgrade Management), alongside several additional features – Windows Autopilot and Hexnode Access catering to its Windows user base. Windows Patch Management: Streamlining updates and upgrades As the challenges of patch management intensified…
Mr. Cooper breach exposes sensitive info of over 14 million customers
Mortgage company Mr. Cooper has confirmed that personal information of over 14.6 million customers has been exposed in its October 2023 data breach. The breach “On October 31, 2023, Mr. Cooper detected suspicious activity in certain network systems,” the company…
Cleafy improves banking security with real-time AI capabilities
In the ever-evolving landscape of banking and financial security, new malware variants poses a significant and imminent challenge. Traditionally, both the identification and classification of these threats only occurred post-attack, leaving banks and financial institutions vulnerable to substantial losses and…
SSH vulnerability exploitable in Terrapin attacks (CVE-2023-48795)
Security researchers have discovered a vulnerability (CVE-2023-48795) in the SSH cryptographic network protocol that could allow an attacker to downgrade the connection’s security by truncating the extension negotiation message. The Terrapin attack Terrapin is a prefix truncation attack targeting the…