Category: Help Net Security

Crypto Quantique introduces SaaS platform QuarkLink Ignite

Crypto Quantique has released QuarkLink Ignite, a Software-as-a-Service (SaaS) platform that enables developers and engineers to achieve secure connectivity management free-of-charge for up to 50 ESP32 devices. QuarkLink Ignite is a toolset that allows developers and engineers to explore chip-to-cloud…

Has Sony been hacked again?

Ransomed.vc, a relatively new ransomware / cyber extortion group, claims to have hacked Sony and made off with valuable data. Sony allegedly hacked and its data held for ransom “We have successfully compromissed all of sony systems. We wont ransom…

Stratascale acquires Vector0 to strengthen its cybersecurity services

Stratascale, an SHI company, announced the acquisition of Vector0, an Attack Surface Management (ASM) provider. Through the acquisition, Stratascale professionals and their customers gain visibility of attack vectors and points of vulnerability, enhancing Stratascale’s ability to deliver proactive cybersecurity services.…

5 free vulnerability scanners you should check out

Vulnerability scanners delve into systems to uncover security gaps. The primary mission? To fortify organizations against breaches and shield sensitive data from exposure. Beyond merely pinpointing weaknesses, vulnerability scanning is a proactive measure to anticipate potential attacker entry points. The…

Cybersecurity skills employers are desperate to find in 2023

The surge in digital economic growth and our increasing dependence on it make cybersecurity a critical profession. In this Help Net Security video, Aaron Rosenmund, Director of Security Research and Curriculum, Pluralsight, discusses the most sought-after cybersecurity skills in today’s…

Fraud prevention forces scammers to up their game

The risk of falling victim to fraud is a constant concern for individuals, businesses, and organizations alike. As technology evolves, so too do the methods employed by fraudsters, making fraud prevention an increasingly critical and complex endeavor. In this Help…

Amazon collaborates with Anthropic to advance generative AI

Amazon and Anthropic announced a strategic collaboration that will bring together their respective technology and expertise in safer generative AI to accelerate the development of Anthropic’s future foundation models and make them widely accessible to AWS customers. As part of…

BinDiff: Open-source comparison tool for binary files

BinDiff is a binary file comparison tool to find differences and similarities in disassembled code quickly. It was made open source today. With BinDiff, you can identify and isolate fixes for vulnerabilities in vendor-supplied patches. You can also port symbols…

Balancing cybersecurity with convenience and progress

Changing approaches to cybersecurity have led to slow but steady progress in defense and protection. Still, competing interests create a growing challenge for cybersecurity decision makers and practitioners, according to CompTIA. The state of cybersecurity Most business and technology professionals…

Current ransomware defenses efforts are not working

Despite some positive developments, the impact of ransomware attacks remains high, according to SpyCloud. Infostealer infections preceded 22% of ransomware events for North American and European ransomware victim companies in 2023 – with common infostealers such as Raccoon, Vidar, and…

DAT introduces AI-powered identity-verification solution

DAT Freight & Analytics introduced an AI-powered identity fraud detection and prevention platform through a partnership with Verosint, to help prevent the unauthorized use of customer login credentials and combat the growing threat of identity theft in trucking and logistics.…

Mitek partners with Equifax to improve consumer identity protection

Mitek announced a strategic partnership with Equifax, a global data, analytics and technology company. The agreement will add Mitek’s biometric-based identity verification and liveness detection technology to Equifax’s digital identity software, further strengthening Equifax’s ability to help companies prevent identity…

Anviz One combats security concerns for all levels of education

Anviz introduced an all-in-one intelligent security solution for the education industry – Anviz One – bolstering the security infrastructure of public and private educational institutions from K-12 to university with lower upfront investment, stronger analytics, and simplified management. A one-stop…

Why more security doesn’t mean more effective compliance

Financial institutions have always been a valuable target for cyberattacks. That’s partly why banking and financial institutions are heavily regulated and have more compliance requirements than those in most other industries. A slew of new rules have been put in…

Ransomware cyber insurance claims up by 27%

Overall cyber insurance claims frequency increased by 12% in the first half of 2023, according to Coalition. Increase in ransomware claims frequency Coalition found that both claims frequency and severity rose for businesses in early 2023 across all revenue bands.…

New infosec products of the week: September 22, 2023

Here’s a look at the most interesting products from the past week, featuring releases from 1Password, Dig Security, Laiyer.ai, Viavi Solutions, and Wing Security. 1Password introduces mobile support for passkeys 1Password customers can now create, manage, and sign in with…

SMEs overestimate their cybersecurity preparedness

57% of SMEs have fallen victim to at least one cybersecurity breach, among whom 31% reported that their business experienced a breach within the past 12 months alone, according to Guardz. The increasing number of evolving cyber threats poses a…

IT pros told to accept burnout as normal part of their job

The vast majority of IT security professionals admit stress has led them and peers to make errors that have caused data breaches, according to Devo Technology. Recent estimates put the shortage of cybersecurity professionals at 3.5 million. The survey demonstrates…

OneLayer expands its private cellular network security solutions

OneLayer announced the expansion of its private cellular network security solutions to encompass the areas of operations and asset management, leveraging the same cyber-related capabilities to provide more value for additional stakeholders in the organization. Following several deployments of their…

Cisco to acquire Splunk in deal valued at $28 billion

Cisco and Splunk announced a definitive agreement under which Cisco intends to acquire Splunk for $157 per share in cash, representing approximately $28 billion in equity value. Upon close of the acquisition, Splunk President and CEO Gary Steele will join…

Viavi Observer Sentry provides threat visibility into AWS environments

Viavi Solutions unveiled Observer Sentry, Software-as-a-Service-based Threat Exposure Management providing SecOps, DevOps, and cloud architects much-needed threat visibility into ever-changing AWS environments. The 2023 State of the Network study from VIAVI revealed increases in enterprises’ dependence on the cloud, dissatisfaction…

Fake WinRAR PoC spread VenomRAT malware

An unknown threat actor has released a fake proof of concept (PoC) exploit for CVE-2023-4047, a recently fixed remote code execution (RCE) vulnerability in WinRAR, to spread the VenomRAT malware. The fake WinRAR PoC On August 17, 2023, Trend Micro’s…

How companies can take control of their cybersecurity

In this Help Net Security interview, Baya Lonqueux, CEO at Reciproc-IT, discusses the evolving cybersecurity landscape and the essential skillsets needed for teams working in this field. The interview highlights the shift from technical expertise to a focus on organizational…

Building GenAI competence for business growth

To embark on the GenAI technology adoption journey for business success, organizations require foundational activities related to GenAI investment, guidance in prioritizing use cases, and identification of key stakeholders essential for building and implementing successful initiatives, according to IDC. Essential…

NordVPN Sonar helps internet users detect phishing emails

NordVPN launched its first experimental project under the NordLabs platform. The AI-enabled browser extension Sonar aims to help internet users detect phishing emails and protect themselves from cybercrimes. “AI tools have facilitated the automation of a significant portion of phishing…

1Password introduces mobile support for passkeys

1Password customers can now create, manage, and sign in with passkeys on a growing number of websites and apps, providing cross-platform access on iOS 17 and Android 14, as well as all major web browsers on Mac, Windows, and Linux.…

Cybellum launches Product Security Synergy Services

Cybellum launched new Product Security Synergy Services, augmenting its platform with a broad set of expert services, covering the entire product lifecycle. Device manufacturers and their suppliers, across all safety-critical industries, including automotive, medical, and industrial equipment, are facing increased…

NETGEAR Orbi 970 Series enhances home connectivity

NETGEAR has introduced the Orbi 970 Series, leveraging innovative antenna design and patented technology to optimize WiFi 7 performance. The Orbi 970 Series delivers speeds of up to 27 Gbps, a slim, elegant design and high-performance antennas for 360-degree coverage…

VectorZero Active Data Vault 2.0 secures sensitive data

VectorZero announced the newest release of its Active Data Vault, version 2.0, which introduces new cybersecurity features. This highly secure and isolated environment is designed for storage plus secure and easy use of extremely sensitive data. Active Data Vault 2.0…

Egnyte collaborates with Microsoft to drive the hybrid workforce

Egnyte announced an enhanced relationship with Microsoft that provides customers with additional real-time document collaboration and sharing features through Microsoft 365 and a Microsoft Teams integration that makes it easy for customers to share and upload files directly within Teams…

Rising OT/ICS cybersecurity incidents reveal alarming trend

60% of cyberattacks against the industrial sector are led by state-affiliated actors and often unintentionally enabled by internal personnel (about 33% of the time), according to Rockwell Automation. This corroborates other industry research showing OT/ICS (Industrial Control Systems) cybersecurity incidents…

Shadow IT: Security policies may be a problem

3 out of 4 workers use personal (and often unmanaged) phones and laptops for work and nearly half of companies let unmanaged devices access protected resources, a recent report by Kolide and Dimensional Research has revealed. When asked why they…

Open Systems OT Firewall monitors traffic and detects threats

Open Systems introduced OT firewall service to secure critical infrastructures. The Open Systems OT Firewall provides organizations with a dedicated appliance at the center of operational technology (OT) networks for better visibility and control of Industrial Internet of Things (IIoT)…

Companies still don’t know how to handle generative AI risks

Energized by the hype around generative AI, enterprises are aggressively pursuing practical applications of this new technology while remaining cautious about the risks, according to ISG. ISG research shows 85% of companies surveyed believe investments in generative AI within the…

Avoiding domain security risks when taking your business online

Unfortunately, as available domain extensions increase in variety (and uniqueness), so do security risks. In this Help Net Security video, Prudence Malinki, Head of Industry Relations at Markmonitor, discusses best practices enterprises should abide by when kickstarting their online business…

SentiLink unveils Facets to improve financial fraud detection

SentiLink launched Facets, a new intelligent attributes solution that enables U.S. financial institutions to improve fraud models and implement more sophisticated onboarding flows. The solution provides feature-specific intelligence derived from SentiLink’s proprietary identity data and from its broad consortium of…

Kubernetes vulnerability allows RCE on Windows endpoints (CVE-2023-3676)

Three high-severity Kubernetes vulnerabilities (CVE-2023-3676, CVE-2023-3893, CVE-2023-3955) could allow attackers to execute code remotely and gain control over all Windows nodes in the Kubernetes cluster. About the vulnerabilities CVE-2023-3676, discovered by Akamai researcher Tomer Peled, is a command injection vulnerability…

The hidden dangers of low-value data

In this Help Net Security video, Terry Ray, SVP Data Security and Field CTO at Imperva, warns organizations to stop ignoring low-value data – as criminals use it as a place to live, watch, and wait for the perfect moment…

PostgreSQL 16: Where enhanced security meets high performance

PostgreSQL is an open-source object-relational database platform with a track record of over 25 years of ongoing development. Its reputation is solid for its reliability, extensive features, and high performance. PostgreSQL 16 enhances its performance through significant upgrades in query…