Category: Help Net Security

Seemplicity integrates with Wiz to accelerate remediation

Seemplicity announced its technical integration with cloud security provider Wiz. As a certified Wiz Integration (WIN) platform partner, Seemplicity enables joint customers to seamlessly integrate its Security Remediation Operations platform into their existing Wiz workflows to accelerate remediation. “Today security…

Quishing: Tricks to look out for

QR code phishing – aka “quishing” – is on the rise, according to HP, Darktrace, Malwarebytes, AusCERT, and many others. What are QR codes? QR codes are two-dimensional matrix barcodes used for tracking products, identifying items, simplifying actions such as…

VMware patches critical vulnerability in vCenter Server (CVE-2023-34048)

VMware has fixed a critical out-of-bounds write vulnerability (CVE-2023-34048) and a moderate-severity information disclosure flaw (CVE-2023-34056) in vCenter Server, its popular server management software. About CVE-2023-34048 and CVE-2023-34056 CVE-2023-34048 allows an attacker with network access to a vulnerable vCenter Server…

Strategies to overcome cybersecurity misconceptions

Many CISOs may believe their cybersecurity defenses are robust enough to repel any attack, but there are critical misconceptions they may be harboring. In this Help Net Security video, Kevin Kirkwood, Deputy CISO at LogRhythm, stresses that one of the…

Consumers are taking action to protect their privacy

Younger consumers are taking deliberate action to protect their privacy, as 42% of consumers aged 18-24 exercise their Data Subject Access Rights, compared with just 6% for consumers 75 and older, according to Cisco. Consumers express willingness to share their…

Versa Secure SD-LAN delivers zero trust and IoT security

Versa Networks announced Versa Secure SD-LAN, a software-defined branch and campus Local Area Network (LAN) solution to deliver zero trust and IoT security natively at the LAN Edge. This software-defined approach makes campus and branch networks more agile and integrated,…

Drata unveils platform enhancements to automate GRC processes

Drata launched two highly anticipated capabilities: Role-Based Access Control (RBAC) and User Access Reviews (UAR). The addition of Role-Based Access Control enables even more partitioned access to various elements of the Drata platform to better manage compliance programs. And with…

1Password also affected by Okta Support System breach

Following in the footsteps of BeyondTrust and CloudFlare, 1Password has revealed that it has been affected by the Okta Support System breach. “On September 29, we detected suspicious activity on our Okta instance that we use to manage our employee-facing…

The primary pain points for SOC teams

Security professionals want to pursue high-impact work, but they’re being held back by growing workloads, shrinking budgets, and a worsening skills shortage, according to Tines. Nine out of 10 security teams are automating at least some of their work, and…

Wazuh: Free and open-source XDR and SIEM

Wazuh is an open-source platform designed for threat detection, prevention, and response. It can safeguard workloads in on-premises, virtual, container, and cloud settings. Wazuh system comprises an endpoint security agent installed on monitored systems and a management server that processes…

Today’s CIO has ambitions well beyond IT delivery

45% of CIOs are beginning to work with their CxO peers to bring IT and business area staff together to co-lead digital delivery on an enterprise-wide scale, according to Gartner. CIOs face a paradigm shift, sharing leadership responsibilities with CxOs…

Unit21 Real-Time Monitoring empowers users to identify potential fraud

Unit21 launches Real-Time Monitoring to fight real-time fraud and transform the landscape of risk management. With Real-Time Monitoring, fraud prevention teams gain unprecedented capabilities to monitor real-time transactions which allows for proactive fraud prevention, resulting in significant reductions in fraud-related…

Navigating OT/IT convergence and securing ICS environments

Escalating threats to operational technology (OT) have prompted an increasing number of global enterprises to adopt sophisticated technologies and services to enhance the security of their assets. In this Help Net Security video, Christopher Warner, Senior GRC-OT Security Consultant at…

Cyberattacks put healthcare organizations on high alert

Healthcare organizations have become prime targets for cybercriminals due to the immense value of their data, including patient records, sensitive medical information, and financial data. The importance of protecting this invaluable information, alongside ensuring the seamless operation of medical devices…

New infosec products of the week: October 20, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Arcitecta, AuditBoard, BackBox, Prevalent, and Thales. Thales introduces SafeNet IDPrime FIDO Bio Smart Card The SafeNet IDPrime FIDO Bio Smart Card facilitates end user adoption…

Legacy authentication leads to growing consumer frustration

Despite widespread usage of passwords lingering on, consumers want to use stronger, more user-friendly alternatives, according to FIDO Alliance. Entering a password manually without any form of additional authentication was the most commonly used authentication method across the use cases…

Druva launches Dru to make data protection more autonomous

Druva unveiled Dru, an AI copilot for backup that improves how customers engage with their data protection solutions. Dru allows both IT and business users to get critical information through a conversational interface, helping customers reduce protection risks, gain insight…

Zumigo unveils QR code for passwordless login

Zumigo launched a functionality within the Zumigo Assure Authentication product that facilitates the transfer of verified trust from a user’s mobile phone to a desktop, laptop and tablet. The functionality is made possible with a crucial new feature – using…

Zumigo introduces QR code for passwordless login

Zumigo launched a functionality within the Zumigo Assure Authentication product that facilitates the transfer of verified trust from a user’s mobile phone to a desktop, laptop and tablet. The functionality is made possible with a crucial new feature – using…

Sumsub For Fake’s Sake combats deepfake and synthetic fraud

Sumsub released For Fake’s Sake, a set of models enabling the detection of deepfakes and synthetic fraud in visual assets. Following this initial contribution, Sumsub will leverage feedback from the AI-research community to further improve the models’ capabilities. Sumsub has…

itemis and Cybellum partner to enhance product software security

itemis and Cybellum formed a partnership to provide comprehensive cybersecurity solutions for the automotive industry. Drawing on their respective expertise, they have established a formidable alliance that will allow OEMs & Tier-N suppliers to better secure their connected products. The…

Mastercard enhances its solutions using AI technology

With the relentless demand on banks to maintain consumer trust in an ever-evolving payments landscape, Mastercard has launched a new suite of enhanced solutions using AI to help them make good on the promise of ‘always-on’ payments. With millions of…

Google ads for KeePass, Notepad++ lead to malware

Users using Google to search for and download the KeePass password manager and the Notepad++ text editor may have inadvertently gotten saddled with malware, says Jérôme Segura, Director of Threat Intelligence at Malwarebytes. Malvertising via search engine ads is a…

2024 cybersecurity predictions: GenAI edition

Unless you have lived under a rock for the past year, you know that generative artificial intelligence applications, such as ChatGPT, have penetrated many aspects of our online lives. From generating marketing content, creating images for advertisements and blogs, or…

The must-knows about low-code/no-code platforms

The era of AI has proven that machine learning technologies have a unique and effective capability to streamline processes that alter the ways we live and work. We now have the option to listen to playlists carefully curated to match…

Addressing cyber threats in healthcare operational technology

The proliferation of connected medical devices (IoMT) in hospitals demands a holistic approach to cybersecurity beyond just the digital IT realm. Industrial cybersecurity (OT) requires integrated solutions to address its unique challenges. In this Help Net Security video, Estefanía Rojas…

Cyber resilience starts in the C-suite

In many cases, senior executives/line-of-business leaders are minimally engaged in their company’s cyber preparedness initiatives — only 33% of CEOs or managing directors and 21% of other senior leaders are heavily involved, according to Commvault. According to the research, 52%…

State-sponsored APTs are leveraging WinRAR bug

A number of government-backed APTs are exploiting CVE-2023-38831, a file extension spoofing vulnerability in WinRAR, a widely used file archiver utility for Windows. CVE-2023-38831 has been patched in August 2023, along with another high-severity RCE vulnerability (CVE-2023-40477). Exploited as a…

Arcitecta Mediaflux Pocket protects enterprise data

Arcitecta announced Mediaflux Pocket, a multifactor authentication and authorization (MFA&A) application that helps businesses meet data security compliance standards, while significantly reducing the risk of unauthorized access to sensitive data. The new mobile app represents a milestone in Arcitecta’s mission…

Thales introduces SafeNet IDPrime FIDO Bio Smart Card

Thales announced the SafeNet IDPrime FIDO Bio Smart Card, a security key that enables strong MFA for the enterprise. This new contactless smart card allows users to quickly and securely access enterprise devices, applications, and cloud services using a fingerprint…

Jupyter Notebooks targeted by cryptojackers

Cryptojackers are targeting exposed Jupyter Notebooks to install cryptominers and steal credential files for popular cloud services, researchers have uncovered. What are Jupyter Notebooks? “Jupyter is a service that allows you to host individual snippets of code and lets others…

10 essential cybersecurity cheat sheets available for free

Cheat sheets are concise, to-the-point references tailored for instant insights. This article provides a curated list of 10 essential cybersecurity cheat sheets, all free to download. Whether you’re seeking a quick refresher or a beginner trying to make sense of…

SMBs seek help as cyber threats reach an all-time high

Understanding the evolving threat landscape is the biggest cybersecurity challenge facing SMBs, including non-for-profit organizations – and more than half are calling for help to manage the risks, according to Sage. Globally, 48% of SMBs have experienced a cybersecurity incident…

Prevalent Alfred improves third-party risk management

Prevalent introduced Alfred, a virtual third-party risk advisor. Alfred is available in the Prevalent TPRM Platform and is the latest capability delivered as part of Prevalent’s broader strategy to securely and responsibly harness the power of AI to address today’s…

Verint PII Redaction Bot protects sensitive data

Verint launched the Verint Personal Identifiable Information (PII) Redaction Bot giving organizations a way to automate compliance, reduce risk, and protect their customers’ sensitive personal data such as credit card and social security numbers, dates of birth, etc. With data…