Mosint is an automated email OSINT tool written in Go designed to facilitate quick and efficient investigations of target emails. It integrates multiple services, providing security researchers with rapid access to a broad range of information. “In my previous job,…
Category: Help Net Security
Bridging the risk exposure gap with strategies for internal auditors
In this Help Net Security interview, Richard Chambers, Senior Internal Audit Advisor at AuditBoard, discusses the transformational role of the internal audit function and risk management in helping organizations bridge the gap in risk exposure. He talks about how a…
Infosec products of the month: November 2023
Here’s a look at the most interesting products from the past month, featuring releases from: Action1, Amazon, Aqua Security, ARMO, Datadog, Devo Technology, Druva, Entrust, Enzoic, Fortanix, GitHub, Illumio, Immuta, IRONSCALES, Kasada, Lacework, Malwarebytes, OneSpan, Paladin Cloud, Snappt, ThreatModeler, and…
Organizations can’t ignore the surge in malicious web links
Despite the rising adoption of collaboration and instant messaging software, email remains a significant area of concern regarding cyber attacks, particularly the increasing threat of cybercriminals employing harmful web links in emails, according to Hornetsecurity. Attack techniques used in email…
ManageEngine introduces a dual-layered threat detection system in its SIEM solution, Log360
ManageEngine has unveiled the dual-layered threat detection system in its security information and event management (SIEM) solution, Log360. The new feature, available in Log360’s threat detection, investigation and response (TDIR) component, Vigil IQ, empowers security operations center (SOC) teams in…
1Kosmos enables identity proofing from the web, without downloading a mobile app
1Kosmos announced the 1Kosmos BlockID platform now enables organizations to seamlessly extend web-based identity proofing sessions to a user’s mobile device for scanning government issued documents. This new capability does not require a mobile application, and creates a frictionless web…
FileCloud and Votiro join forces to protect customers from file-borne threats
FileCloud announced a partnership with Votiro to provide customers with options to enhance their security posture. FileCloud is used by leading government and private sector organizations worldwide for secure, compliant file sharing and content collaboration. This partnership shows FileCloud’s commitment…
PoCs for critical Arcserve UDP vulnerabilities released
Arcserve has fixed critical security vulnerabilities (CVE-2023-41998, CVE-2023-41999, CVE-2023-42000) in its Unified Data Protection (UDP) solution, PoCs for which have been published by Tenable researchers on Monday. The vulnerabilities Arcserve UDP is a popular enterprise data protection, backup and disaster…
BlueVoyant acquires Conquest Cyber to help clients mitigate risks while meeting new requirements
BlueVoyant announced the acquisition of Conquest Cyber, a cyber defense company renowned for its innovative SaaS technology that streamlines risk management across an organization’s entire cyber program. Conquest Cyber has proven successful within high-security environments, including the U.S. Defense Industrial…
GuidePoint Security announces Compliance Management as a Service
GuidePoint Security launched Compliance Management as a Service, which will help organizations stay on top of required activities and maintain the necessary data to support future compliance assessments. “While organizations may work intensely to meet certain compliance standards, they are…
Business metrics for Cisco Cloud Observability capability enables customers to protect revenue
Cisco announced new business metrics in Cisco Cloud Observability. Powered by the Cisco Observability Platform to enhance business context for modern applications running on AWS. This latest release also supports integration with AWS services and application performance monitoring (APM) correlation…
Google fixes Chrome zero day exploited in the wild (CVE-2023-6345)
Google has released an urgent security update to fix a number of vulnerabilities in Chrome browser, including a zero-day vulnerability (CVE-2023-6345) that is being actively exploited in the wild. About CVE-2023-6345 CVE-2023-6345, reported by Benoît Sevens and Clément Lecigne of…
Okta breach: Hackers stole info on ALL customer support users
The scope of the recent breach of the Okta customer support system is much wider than initially established, the company has admitted on Tuesday: the attackers downloaded a report that contained the names and email addresses of all Okta customer…
SentinelOne and Pax8 expand partnership to enhance security measures for SMBs
For more than four years, SentinelOne and Pax8 have been teaming to provide SMBs with next-generation cybersecurity solutions that enable them to protect their most critical infrastructure and assets from end to end. The strategic partners announced a significant expansion…
Tails 5.2.0 comes with several improvements, updated Tor Browser
Tails is a portable operating system that protects against surveillance and censorship. Tails can be installed on any USB stick with a minimum of 8 GB. Tails works on most computers under ten years old. You can start again on…
5 resolutions to prepare for SEC’s new cyber disclosure rules
2023 has been marked as a year of global conflict and unrest, all of which will impact the cyber threat landscape for years to come. However, one of the most significant cyber security developments for 2024 isn’t driven by attackers.…
Strategies for cultivating a supportive culture in zero-trust adoption
In this Help Net Security interview, Wolfgang Goerlich, Advisory CISO at Cisco, discusses the benefits of implementing a mature zero-trust model for both security and business outcomes, revealing a decrease in reported security incidents and enhanced adaptability. Goerlich emphasizes the…
Enterprises prepare for the inevitable cyber attack
Recent IDC research shows that in many cases, senior executives/line-of-business leaders are minimally engaged in their company’s cyber preparedness initiatives. In fact, 52% of senior leaders have no involvement in their company’s cyber cases. In this Help Net Security video,…
Vigil: Open-source LLM security scanner
Vigil is an open-source security scanner that detects prompt injections, jailbreaks, and other potential threats to Large Language Models (LLMs). Prompt injection arises when an attacker successfully influences an LLM using specially designed inputs. This leads to the LLM unintentionally…
Lacework AI Assist enhances SOC efficiency
Lacework has released a generative artificial intelligence (AI) assistant that gives enterprise customers a new way to engage with the Lacework platform by providing customized context to investigate and remediate proactive and reactive alerts. This capability extends the impact of…