Software development firm JetBrains has fixed a critical vulnerability (CVE-2023-42793) in its TeamCity continuous integration and continuous delivery (CI/CD) solution, which may allow authenticated attackers to achieve remote code execution and gain control of the server. “As of September 25,…
Category: Help Net Security
Transposit On-Call enables users to handle incidents from alert to resolution
Transposit announced new on-call capabilities in its end-to-end incident management platform. Transposit On-Call reimagines how platform teams, SREs, on-call engineers, and customer support teams handle incidents from alert to resolution — whether they’re seasoned pros or just getting started. Effective…
Immersive Labs Workforce Exercising allows cyber leaders to identify and fill skills gaps
Immersive Labs unveiled the expansion of its AI-ready platform, now with coverage across the entire organization through its new Workforce Exercising solution. With comprehensive cyber skills development for all roles, leaders can confidently build and prove organization-wide cyber resilience against…
Crypto Quantique introduces SaaS platform QuarkLink Ignite
Crypto Quantique has released QuarkLink Ignite, a Software-as-a-Service (SaaS) platform that enables developers and engineers to achieve secure connectivity management free-of-charge for up to 50 ESP32 devices. QuarkLink Ignite is a toolset that allows developers and engineers to explore chip-to-cloud…
Censys Internet Map helps organizations identify, understand and mitigate threats
Censys announced the Censys Internet Map. As the data foundation that powers the Censys Internet Intelligence Platform, the Censys Internet Map provides users with the most comprehensive, up-to-date collection of global internet infrastructure to empower security and intelligence teams. In…
Cl0p’s MOVEit attack tally surpasses 2,000 victim organizations
The number of victim organizations hit by Cl0p via vulnerable MOVEit installations has surpassed 2,000, and the number of affected individuals is now over 60 million. The victim organizations are overwhelmingly based in the US. “The most heavily impacted sectors…
Siren 13.4 provides accelerated data retrieval for analysts
Siren announced details of a new patent and the release of Siren 13.4. Dr. Renaud Delbru, Chief Scientific Officer at Siren, said: “Our most recent patent stands out as a one-of-a-kind offering in the market, reaffirming our commitment to innovation.…
Has Sony been hacked again?
Ransomed.vc, a relatively new ransomware / cyber extortion group, claims to have hacked Sony and made off with valuable data. Sony allegedly hacked and its data held for ransom “We have successfully compromissed all of sony systems. We wont ransom…
Stratascale acquires Vector0 to strengthen its cybersecurity services
Stratascale, an SHI company, announced the acquisition of Vector0, an Attack Surface Management (ASM) provider. Through the acquisition, Stratascale professionals and their customers gain visibility of attack vectors and points of vulnerability, enhancing Stratascale’s ability to deliver proactive cybersecurity services.…
5 free vulnerability scanners you should check out
Vulnerability scanners delve into systems to uncover security gaps. The primary mission? To fortify organizations against breaches and shield sensitive data from exposure. Beyond merely pinpointing weaknesses, vulnerability scanning is a proactive measure to anticipate potential attacker entry points. The…
Are developers giving enough thought to prompt injection threats when building code?
With National Coding Week behind us, the development community has had its annual moment of collective reflection and focus on emerging technologies that are shaping the industry. Among these, large language models (LLMs) and “generative AI” have become a cornerstone…
Cybersecurity skills employers are desperate to find in 2023
The surge in digital economic growth and our increasing dependence on it make cybersecurity a critical profession. In this Help Net Security video, Aaron Rosenmund, Director of Security Research and Curriculum, Pluralsight, discusses the most sought-after cybersecurity skills in today’s…
MITRE ATT&CK project leader on why the framework remains vital for cybersecurity pros
MITRE ATT&CK, a common language for cybersecurity professionals to communicate with each other and better understand real-world adversary behaviors, celebrates its 10th anniversary this fall. In this Help Net Security interview, project leader Adam Pennington discusses the framework, how defenders…
IT workers see generative AI as a serious threat to their profession
While many IT workers see the productivity benefits of AI, 56% believe it benefits employers more than employees, according to Ivanti. Additionally, 63% are concerned generative AI tools might take their job in the next five years compared to 44%…
Fraud prevention forces scammers to up their game
The risk of falling victim to fraud is a constant concern for individuals, businesses, and organizations alike. As technology evolves, so too do the methods employed by fraudsters, making fraud prevention an increasingly critical and complex endeavor. In this Help…
Zyxel announces WiFi 6-enabled security firewalls for small- and medium-sized business networks
Zyxel Networks announced the addition of WiFi 6-enabled security firewalls to its ZyWALL USG FLEX 100 firewall series. Zyxel’s new USG FLEX 100AX Firewall supports WiFi 6 (802.11ax) to provide wired and wireless solutions that deliver holistic security and protection…
Thunder Shield Security introduces Custos to help organizations identify critical vulnerabilities
Thunder Shield Security announced Custos, its next-generation scanning platform equipped with artificial intelligence and machine learning to proactively combat cyber threats and safeguard organizations. Custos streamlines cybersecurity with a comprehensive toolkit, including a URL fuzzer, website, network, TCP, UDP, SSL,…
National Student Clearinghouse MOVEit breach impacts nearly 900 schools
US educational nonprofit organization National Student Clearinghouse (NSC) has revealed that the breach of its MOVEit server ended up affecting almost 900 colleges and universities, and resulted in the theft of personal information of their students. The National Student Clearinghouse…
Allegro Packets boosts analysis performance with new features and enhancements
Allegro Packets is providing network professionals with enhanced functionality with its new Release 4.1. More than 100 new features, improvements and bug fixes are included in the update, which is now available to all customers. “With Release 4.1, we continue…
Amazon collaborates with Anthropic to advance generative AI
Amazon and Anthropic announced a strategic collaboration that will bring together their respective technology and expertise in safer generative AI to accelerate the development of Anthropic’s future foundation models and make them widely accessible to AWS customers. As part of…
Hands-on threat simulations: Empower cybersecurity teams to confidently combat threats
Security processes are increasingly automated which has led some businesses to deprioritize developing their security teams’ defense skills. While antivirus and non-human generated threat detections efficiently identify vulnerabilities, they cannot detect every single threat. With the rising number of cyber-attacks,…
BinDiff: Open-source comparison tool for binary files
BinDiff is a binary file comparison tool to find differences and similarities in disassembled code quickly. It was made open source today. With BinDiff, you can identify and isolate fixes for vulnerabilities in vendor-supplied patches. You can also port symbols…
Hands-on threat simulations: empower cybersecurity teams to confidently combat threats
Security processes are increasingly automated which has led some businesses to deprioritize developing their security teams’ defense skills. While antivirus and non-human generated threat detections efficiently identify vulnerabilities, they cannot detect every single threat. With the rising number of cyber-attacks,…
Balancing cybersecurity with convenience and progress
Changing approaches to cybersecurity have led to slow but steady progress in defense and protection. Still, competing interests create a growing challenge for cybersecurity decision makers and practitioners, according to CompTIA. The state of cybersecurity Most business and technology professionals…
How global enterprises navigate the complex world of data privacy
In this Help Net Security interview, Evelyn de Souza, Head of Privacy Compliance, Oracle SaaS Cloud, talks about the constant efforts required to keep up with privacy laws in each country, and ensuring compliance across the entire organization. She also…
Despite rising insider risk costs, budgets are being wasted in the wrong places
The cost of an insider risk is the highest it’s ever been, as organizations spend more time than ever trying to contain insider incidents, according to DTEX Systems. The average annual cost of an insider risk has increased to $16.2…
Current ransomware defenses efforts are not working
Despite some positive developments, the impact of ransomware attacks remains high, according to SpyCloud. Infostealer infections preceded 22% of ransomware events for North American and European ransomware victim companies in 2023 – with common infostealers such as Raccoon, Vidar, and…
Week in review: 18 free Microsoft Azure cybersecurity resources, K8 vulnerability allows RCE
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: LLM Guard: Open-source toolkit for securing Large Language Models LLM Guard is a toolkit designed to fortify the security of Large Language Models (LLMs). It…
Keysight collaborates with Synopsys to secure IoT devices against attacks
Keysight Technologies and Synopsys are partnering to provide internet of things (IoT) device makers with a comprehensive cybersecurity assessment solution to ensure consumers are protected when devices are shipped to market. Under the arrangement, the Synopsys Defensics fuzzing tool will…
Norton Secure Browser blocks malicious websites and phishing attempts
To help protect consumers from browser-based security, privacy and identity threats, Norton, a consumer Cyber Safety brand of Gen, has released Norton Secure Browser. Just as a passport is essential for travel, web browsers are essential for exploring the internet,…
DAT introduces AI-powered identity-verification solution
DAT Freight & Analytics introduced an AI-powered identity fraud detection and prevention platform through a partnership with Verosint, to help prevent the unauthorized use of customer login credentials and combat the growing threat of identity theft in trucking and logistics.…
Mitek partners with Equifax to improve consumer identity protection
Mitek announced a strategic partnership with Equifax, a global data, analytics and technology company. The agreement will add Mitek’s biometric-based identity verification and liveness detection technology to Equifax’s digital identity software, further strengthening Equifax’s ability to help companies prevent identity…
Anviz One combats security concerns for all levels of education
Anviz introduced an all-in-one intelligent security solution for the education industry – Anviz One – bolstering the security infrastructure of public and private educational institutions from K-12 to university with lower upfront investment, stronger analytics, and simplified management. A one-stop…
Apple fixes 3 zero-day vulnerabilities exploited to compromise iPhones
Apple has released updates for iOS and iPadOS, macOS, watchOS, and Safari to fix three zero-day vulnerabilities (CVE-2023-41992, CVE-2023-41991, CVE-2023-41993) exploited “against versions of iOS before iOS 16.7.” Bill Marczak of The Citizen Lab at The University of Toronto’s Munk…
GitLab fixes critical vulnerability, patch now! (CVE-2023-5009)
GitLab has fixed a critical vulnerability (CVE-2023-5009) in the Enterprise Edition (EE) and Community Edition (CE) of its widely used DevOps platform. They flaw may allow a threat actor to abuse scan execution policies to run pipelines as another user.…
Contrast Security integrates with AWS Security Hub to help organizations mitigate threats
Contrast Security, the code security platform built for developers and trusted by security, today announced its integration with Amazon Web Services (AWS) Security Hub to offer full-spectrum security visibility, from infrastructure to applications. AWS Security Hub is a cloud security…
Why more security doesn’t mean more effective compliance
Financial institutions have always been a valuable target for cyberattacks. That’s partly why banking and financial institutions are heavily regulated and have more compliance requirements than those in most other industries. A slew of new rules have been put in…
Code alterations more prevalent in Android apps than iOS
57% of all monitored apps are under attack, with gaming (63%) and FinServ (62%) apps facing the highest risk, according to Digital.ai. The study found no correlation between an app’s popularity and likelihood of being attacked but found Android apps…
Ransomware cyber insurance claims up by 27%
Overall cyber insurance claims frequency increased by 12% in the first half of 2023, according to Coalition. Increase in ransomware claims frequency Coalition found that both claims frequency and severity rose for businesses in early 2023 across all revenue bands.…
New infosec products of the week: September 22, 2023
Here’s a look at the most interesting products from the past week, featuring releases from 1Password, Dig Security, Laiyer.ai, Viavi Solutions, and Wing Security. 1Password introduces mobile support for passkeys 1Password customers can now create, manage, and sign in with…
SMEs overestimate their cybersecurity preparedness
57% of SMEs have fallen victim to at least one cybersecurity breach, among whom 31% reported that their business experienced a breach within the past 12 months alone, according to Guardz. The increasing number of evolving cyber threats poses a…
IT pros told to accept burnout as normal part of their job
The vast majority of IT security professionals admit stress has led them and peers to make errors that have caused data breaches, according to Devo Technology. Recent estimates put the shortage of cybersecurity professionals at 3.5 million. The survey demonstrates…
OneLayer expands its private cellular network security solutions
OneLayer announced the expansion of its private cellular network security solutions to encompass the areas of operations and asset management, leveraging the same cyber-related capabilities to provide more value for additional stakeholders in the organization. Following several deployments of their…
Cisco to acquire Splunk in deal valued at $28 billion
Cisco and Splunk announced a definitive agreement under which Cisco intends to acquire Splunk for $157 per share in cash, representing approximately $28 billion in equity value. Upon close of the acquisition, Splunk President and CEO Gary Steele will join…
Dig enhances its platform to protect enterprise data in all storage environments
Dig has expanded the Dig Data Security Platform to protect data anywhere enterprises store sensitive information, including public cloud, software as a service (SaaS), database as a service (DBaaS) and on-premise environments. Dig’s data security posture management (DSPM) and data…
BlueVoyant Supply Chain Defense enhancements reduce issues in third-party ecosystems
BlueVoyant released new Supply Chain Defense (SCD) product offerings and services. BlueVoyant now provides a comprehensive solution to reduce cyber risk in organizations’ third-party ecosystems. BlueVoyant has added more options for continuous monitoring of vendors, a fully configurable questionnaire management…
Viavi Observer Sentry provides threat visibility into AWS environments
Viavi Solutions unveiled Observer Sentry, Software-as-a-Service-based Threat Exposure Management providing SecOps, DevOps, and cloud architects much-needed threat visibility into ever-changing AWS environments. The 2023 State of the Network study from VIAVI revealed increases in enterprises’ dependence on the cloud, dissatisfaction…
CyberArk and Accenture join forces to improve identity security for organizations
CyberArk announced that Accenture has expanded its deployment of the CyberArk Identity Security Platform to include CyberArk Privilege Cloud. The solution enables Accenture to control and monitor privileged access across on-premises, cloud and hybrid infrastructures for clients as well as…
Juniper Apstra enhancements simplify and standardize data center architectures
Juniper Networks announced new Juniper Apstra capabilities that enhance operator experiences to facilitate the deployment and operations of private data center infrastructures. With the introduction of new experience-first data center features, including simplified data collection and visualization via graph databases,…
Fake WinRAR PoC spread VenomRAT malware
An unknown threat actor has released a fake proof of concept (PoC) exploit for CVE-2023-4047, a recently fixed remote code execution (RCE) vulnerability in WinRAR, to spread the VenomRAT malware. The fake WinRAR PoC On August 17, 2023, Trend Micro’s…
Fortress Information Security partners with NetRise to secure software supply chains
Fortress Information Security and NetRise partnered to offer a new, innovative Software Bill of Materials (SBOM) transparency solution to secure software supply chains and meet evolving regulatory requirements for software transparency. Fortress’ cybersecurity experts partner with public sector organizations and…
Critical Trend Micro vulnerability exploited in the wild (CVE-2023-41179)
Trend Micro has fixed a critical zero-day vulnerability (CVE-2023-41179) in several of its endpoint security products for enterprises that has been spotted being exploited in the wild. About CVE-2023-41179 The nature of the flaw hasn’t been revealed, but we know…
Regulatory pressure complicates cybersecurity for industrial equipment manufacturers
50% of companies lack a dedicated security function for control systems and devices within their organizational structure, according to Cybellum. Security incidents involving industrial organizations have seen a sharp rise in recent years, with notable cases highlighting the vulnerabilities in…
How companies can take control of their cybersecurity
In this Help Net Security interview, Baya Lonqueux, CEO at Reciproc-IT, discusses the evolving cybersecurity landscape and the essential skillsets needed for teams working in this field. The interview highlights the shift from technical expertise to a focus on organizational…
How to set up and speed up Amazon S3 Replication for cross-region data replication
Amazon S3 is a simple cloud storage solution enabling effortless storage and retrieval of large amounts of data from different geographies. It’s engineered for scalability, durability, and security, making it a popular option for data storage and distribution. In addition,…
Building GenAI competence for business growth
To embark on the GenAI technology adoption journey for business success, organizations require foundational activities related to GenAI investment, guidance in prioritizing use cases, and identification of key stakeholders essential for building and implementing successful initiatives, according to IDC. Essential…
Hidden dangers loom for subsea cables, the invisible infrastructure of the internet
More than 97% of the world’s internet traffic passes through subsea cables at some point, according to ENISA. Subsea cables are a vital component of the global internet infrastructure, and it is critical to protect them from cyberattacks, physical attacks…
Wing Security releases SaaS protection tier for mid-market companies
Wing Security launched its new SSPM for Compliance tier, enabling midmarket companies to adopt SaaS solutions while meeting a base level of security required by compliance frameworks. Customers who are seeking a comprehensive 24×7 posture management solution can upgrade their…
NordVPN Sonar helps internet users detect phishing emails
NordVPN launched its first experimental project under the NordLabs platform. The AI-enabled browser extension Sonar aims to help internet users detect phishing emails and protect themselves from cybercrimes. “AI tools have facilitated the automation of a significant portion of phishing…
McAfee Scam Protection blocks fake emails, texts, and social media links
McAfee launched McAfee Scam Protection to address the rise in AI-generated phishing scams. The latest feature in McAfee’s product suite draws on patented AI technology to turn the tables on cybercriminals using AI to turbocharge scams and deceive people out…
1Password introduces mobile support for passkeys
1Password customers can now create, manage, and sign in with passkeys on a growing number of websites and apps, providing cross-platform access on iOS 17 and Android 14, as well as all major web browsers on Mac, Windows, and Linux.…
Akamai partners with Corero Network Security to improve DDoS protection for enterprises
Akamai announced a global partnership with Corero Network Security, the specialists in distributed denial-of-service (DDoS) protection solutions. Akamai is now offering Corero’s on-premises DDoS protection to extend Akamai Prolexic, Akamai’s own comprehensive portfolio of DDoS security solutions. DDoS attacks continue…
Cybellum launches Product Security Synergy Services
Cybellum launched new Product Security Synergy Services, augmenting its platform with a broad set of expert services, covering the entire product lifecycle. Device manufacturers and their suppliers, across all safety-critical industries, including automotive, medical, and industrial equipment, are facing increased…
Legit Security raises $40 million to address AI’s threats to applications
Legit Security has successfully closed a $40 million venture capital round investment led by CRV with participation from existing investors Cyberstarts, Bessemer Venture Partners, and TCV. Legit Security’s ASPM platform continuously reduces application risk through discovery, analysis, correlation, and remediation…
Oracle Fusion Data Intelligence Platform enables users to achieve better business outcomes
Oracle announced the Fusion Data Intelligence Platform, a next-generation data, analytics, and AI platform that will help Oracle Fusion Cloud Applications customers achieve better business outcomes by combining data-driven insights with intelligent decisions and actions. This new platform, an evolution…
Mirantis Lens AppIQ empowers developers to visualize application details
Mirantis launched Lens AppIQ, available directly to the 50,000 organizations who use Lens today directly in Lens Desktop and as (Software as a Service) SaaS. Lens AppIQ provides application intelligence – collecting information from many different configuration files and sources…
Privacera integrates with Collibra to automate data governance and policy enforcement
Privacera announced its integration with Collibra, the Data Intelligence company, which enables seamless end-to-end data security and data governance. From data cataloging and data classification to enforcement of data access policies, the integration automates data governance and streamlines compliance and…
NETGEAR Orbi 970 Series enhances home connectivity
NETGEAR has introduced the Orbi 970 Series, leveraging innovative antenna design and patented technology to optimize WiFi 7 performance. The Orbi 970 Series delivers speeds of up to 27 Gbps, a slim, elegant design and high-performance antennas for 360-degree coverage…
VectorZero Active Data Vault 2.0 secures sensitive data
VectorZero announced the newest release of its Active Data Vault, version 2.0, which introduces new cybersecurity features. This highly secure and isolated environment is designed for storage plus secure and easy use of extremely sensitive data. Active Data Vault 2.0…
Egnyte collaborates with Microsoft to drive the hybrid workforce
Egnyte announced an enhanced relationship with Microsoft that provides customers with additional real-time document collaboration and sharing features through Microsoft 365 and a Microsoft Teams integration that makes it easy for customers to share and upload files directly within Teams…
Red Hat and Intel deliver open source industrial automation to the manufacturing shop floor
Red Hat announced a new industrial edge platform, designed in collaboration with Intel, that will provide a modern approach to building and operating industrial controls. By transforming the way manufacturers operate, scale and innovate with standard IT technologies delivered to…
Rising OT/ICS cybersecurity incidents reveal alarming trend
60% of cyberattacks against the industrial sector are led by state-affiliated actors and often unintentionally enabled by internal personnel (about 33% of the time), according to Rockwell Automation. This corroborates other industry research showing OT/ICS (Industrial Control Systems) cybersecurity incidents…
18 free Microsoft Azure cybersecurity resources you should check out
Far exceeding a traditional public cloud platform, Azure is a comprehensive suite of over 200 products and cloud services engineered to solve current challenges and pave the way for the future. Whether you’re looking to build, run, or manage applications,…
What AppSec and developers working in cloud-native environments need to know
All enterprise organizations are, in essence, software publishers, regardless of their industry. This is because every enterprise relies on custom software applications for managing internal processes, interacting with customers, or analyzing data, making them creators and distributors of software to…
Shadow IT: Security policies may be a problem
3 out of 4 workers use personal (and often unmanaged) phones and laptops for work and nearly half of companies let unmanaged devices access protected resources, a recent report by Kolide and Dimensional Research has revealed. When asked why they…
Strong compliance management is crucial for fintech-bank partnerships
72% of banks and credit unions are prioritizing compliance when evaluating fintechs, citing it as their top criteria in the due diligence process, according to Ncontracts. As banks and credit unions evaluate fintech partnerships, cybersecurity (62%) is also a critical…
Security concerns and outages elevate observability from IT niche to business essential
Enterprises that leverage observability increase operational efficiency and grow revenue, according to SolarWinds. The report explores how enterprises can act proactively to maximise the advantages of their observability solutions, integrate best practices into implementations, and mitigate common adoption challenges. The…
Deepwatch platform enhancements improve cyber resiliency for businesses
Deepwatch announced new enhancements to the Deepwatch Managed Security Platform that improve the ability for companies to anticipate, respond, recover, and withstand future cyber threats while continuously improving business resiliency. The new platform enhancements are designed to move Deepwatch and…
Ping Identity introduces passwordless solution for better customer experiences
Ping Identity released PingOne for Customers Passwordless, a cloud solution that helps enterprises accelerate their passwordless initiatives and make the digital experiences for customers more convenient and seamless. PingOne for Customers Passwordless allows administrators to design, test, and deploy secure…
Entrust’s zero trust solutions enhance security of applications, encryption keys and secrets
Entrust announced new capabilities to help organizations enhance their security posture and advance their zero trust maturity journey. The new features extend protections, visibility, and governance over virtual infrastructures, code and application development, and cryptographic key management. “IT and security…
Open Systems OT Firewall monitors traffic and detects threats
Open Systems introduced OT firewall service to secure critical infrastructures. The Open Systems OT Firewall provides organizations with a dedicated appliance at the center of operational technology (OT) networks for better visibility and control of Industrial Internet of Things (IIoT)…
OneTrust helps organizations manage the complexity of their trust programs
OneTrust unveiled innovations to help organizations manage the complexity of their trust programs, better understand their data to activate and use it, be more resilient against emerging threats, and unlock productivity when navigating compliance. These innovations include new capabilities across…
LogRhythm and Novacoast join forces to identify and counteract malicious actors
LogRhythm announced its partnership with Novacoast, a cybersecurity, identity and access company specializing in managed security, engineering, development, and advisory services. This partnership marks a significant milestone as Novacoast becomes the first LogRhythm Axon service provider to provide level one…
Egnyte simplifies AI deployment for customers in AEC industries
Egnyte announced vertical AI solutions for the Architecture, Engineering, and Construction (AEC) industries. The new solutions will simplify AI deployment and improve model accuracy for customers in AEC industries. Egnyte customers can use the new AI models to label jobsite…
NightDragon and CyberKnight strengthen cybersecurity in the Middle East, Turkey and Africa
NightDragon announced a new strategic partnership with CyberKnight to continue the international expansion capabilities of its portfolio companies and bring the latest CSSP innovations to customers in the Middle East, Turkey, Africa (META) and other regions. CyberKnight has rapidly grown…
An inside look at NetSPI’s impressive Breach and Attack Simulation platform
In this Help Net Security interview, Scott Sutherland, VP of Research at NetSPI, delves into the intricacies of their Breach and Attack Simulation (BAS) platform and discusses how it offers unique features – from customizable procedures to advanced plays –…
Balancing budget and system security: Approaches to risk tolerance
Data breaches are a dime a dozen. Although it’s easy to look at that statement negatively, the positive viewpoint is that, as a result, cybersecurity professionals have plenty of learning moments. Learning what went wrong and why can be a…
Never use your master password as a password on other accounts
One in three Americans now use password managers, up from one in five in 2022, according to an online poll by Security.org that quizzed 1,051 American adults on how they use passwords and password managers. How users choose and use…
Companies still don’t know how to handle generative AI risks
Energized by the hype around generative AI, enterprises are aggressively pursuing practical applications of this new technology while remaining cautious about the risks, according to ISG. ISG research shows 85% of companies surveyed believe investments in generative AI within the…
Avoiding domain security risks when taking your business online
Unfortunately, as available domain extensions increase in variety (and uniqueness), so do security risks. In this Help Net Security video, Prudence Malinki, Head of Industry Relations at Markmonitor, discusses best practices enterprises should abide by when kickstarting their online business…
LLM Guard: Open-source toolkit for securing Large Language Models
LLM Guard is a toolkit designed to fortify the security of Large Language Models (LLMs). It is designed for easy integration and deployment in production environments. It provides extensive evaluators for both inputs and outputs of LLMs, offering sanitization, detection…
Organizations are racing against time to meet the PCI DSS 4.0 deadline
Payment data security concerns remain widespread as organizations undertake significant lift to meet the PCI DSS 4.0 deadline, according to Bluefin. 94% of survey respondents said they have significant or very significant concerns pertaining to payment data security. Additionally, only…
Venafi Control Plane enhancements help enterprises manage machine identities of all kinds
Venafi launched a suite of innovations within its Control Plane for Machine Identities. These innovations expand Venafi’s software-as-a-service (SaaS) machine identity management platform, equipping security and platform teams to accelerate modernization and safeguard their organizations against the challenges of cloud…
SentiLink unveils Facets to improve financial fraud detection
SentiLink launched Facets, a new intelligent attributes solution that enables U.S. financial institutions to improve fraud models and implement more sophisticated onboarding flows. The solution provides feature-specific intelligence derived from SentiLink’s proprietary identity data and from its broad consortium of…
Wipro partners with ServiceNow to optimize clients’ risk and security operations
Wipro has partnered with ServiceNow to create Wipro CyberTransform – Intelligent ServiceNow Risk and Security Solutions, a solution that enables organisations to integrate their risk, compliance, and security postures more effectively. In the current climate, organizations are increasingly having to…
Kubernetes vulnerability allows RCE on Windows endpoints (CVE-2023-3676)
Three high-severity Kubernetes vulnerabilities (CVE-2023-3676, CVE-2023-3893, CVE-2023-3955) could allow attackers to execute code remotely and gain control over all Windows nodes in the Kubernetes cluster. About the vulnerabilities CVE-2023-3676, discovered by Akamai researcher Tomer Peled, is a command injection vulnerability…
Resecurity names Mohammed Alghamdi as the Managing Director in the Kingdom of Saudi Arabia
Resecurity has appointed Mohammed Alghamdi as the Managing Director for its operations in the Kingdom of Saudi Arabia (KSA). With a distinguished professional career spanning government relations management and successful collaborations with both private and public sector organizations, Mr. Alghamdi…
Industrial cybersecurity giant Dragos rakes in new funding, sets sights on global expansion
Today, Dragos revealed that it has secured a $74 million Series D extension funding round, spearheaded by the strategic operating and investment firm WestCap. The funding extension comes when global governments and infrastructure providers increasingly acknowledge the critical role of…
The hidden dangers of low-value data
In this Help Net Security video, Terry Ray, SVP Data Security and Field CTO at Imperva, warns organizations to stop ignoring low-value data – as criminals use it as a place to live, watch, and wait for the perfect moment…
PostgreSQL 16: Where enhanced security meets high performance
PostgreSQL is an open-source object-relational database platform with a track record of over 25 years of ongoing development. Its reputation is solid for its reliability, extensive features, and high performance. PostgreSQL 16 enhances its performance through significant upgrades in query…