Category: Help Net Security

Modernizing fraud prevention with machine learning

The number of digital transactions has skyrocketed. As consumers continue to spend and interact online, they have growing expectations for security and identity verification. As fraudsters become savvier and more opportunistic, there’s an increased need for businesses to protect customers…

Enterprises persist with outdated authentication strategies

Despite authentication being a cornerstone of cybersecurity, risk mitigation strategies remain outdated, according to new research from Enzoic. With the attack surface expanding and the increasing sophistication of cyber threats, organizations are struggling to deliver secure and user-friendly authentication. The…

New infosec products of the week: September 15, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Armis, Cisco, CTERA, Kingston Digital, Purism, and Swissbit. Librem 11 tablet sets new standard for privacy and security with Linux-based PureOS Purism introduced the new…

Securing OTA with Harman International’s Michal Geva

The once far-off vision of remotely updating software without needing to bring it into a service center was initially designed for bug fixes and cybersecurity updates. Today, over-the-air updates (OTA) are used to activate new functionality and upgrade a vehicle–…

Generative AI lures DevOps and SecOps into risky territory

Application security leaders are more optimistic than developer leaders on generative AI, though both agree it will lead to more pervasive security vulnerabilities in software development, according to Sonatype. According to the surveyed DevOps and SecOps leaders, 97% are using…

CloudBees unveils a new DevSecOps platform

CloudBees has unveiled a new cloud native DevSecOps platform that places platform engineers and developer experience front and center. The platform is built on Tekton, uses a GitHub Actions style domain-specific language (DSL), and adds feature flagging, security, compliance, pipeline…

Great security training is a real challenge

All employees need security training, yet it’s generally a resented afterthought. A variety of studies over years show that human error is generally felt to be the largest vulnerability in organizations. For technology companies like SaaS providers, who also need…

Download: Ultimate guide to Certified in Cybersecurity

The ultimate guide covers everything you need to know about the entry-level Certified in Cybersecurity certification and how to get started with FREE training and exam through ISC2’s 1MCC program! No experience is required, just a passion for cybersecurity. It’s…

Rising OT/ICS cybersecurity incidents reveal alarming trend

60% of cyberattacks against the industrial sector are led by state-affiliated actors and often unintentionally enabled by internal personnel (about 33% of the time), according to Rockwell Automation. This corroborates other industry research showing OT/ICS (Industrial Control Systems) cybersecurity incidents…

Armis Centrix delivers a modular approach to cyber exposure management

Armis has launched Armis Centrix, the AI-powered cyber exposure management platform. Armis Centrix is a seamless, frictionless, cloud-based platform that proactively secures all your assets, remediates vulnerabilities, blocks threats and protects your entire attack surface. Armis Centrix enables organizations to…

Torii launches generative AI-powered SaaS Management Platform

Torii has introduced its next generation SaaS Management Platform (SMP), featuring a series of product releases that set a new standard for innovation and extensibility in SMPs. The only SMP powered by generative AI, Torii’s enhanced platform equips bandwidth-strapped IT…

Salesforce and Google join forces to drive productivity with AI

Salesforce and Google have expanded their strategic partnership to bring together Salesforce and Google Workspace to drive productivity with AI. This partnership will deliver new bidirectional integrations that allow customers to bring together context from Salesforce and Google Workspace, including…

Everbridge 360 helps organizations optimize their response efforts

Everbridge has launched Everbridge 360, which empowers organizations to manage critical events, minimize communication delays, and enhance overall operational resilience through a unified dashboard. “At Everbridge, our mission is to ensure the safety of people and continuity of organizations in…

Bitwarden strengthens security with SSO integrations for businesses

Bitwarden delivers single sign-on integrations for businesses. With the recent addition of SSO with Trusted Devices, the company extends the security, flexibility, and convenience of its products. “Bitwarden provides businesses with the most effective and innovative credential management solutions that…

MetaStealer malware is targeting enterprise macOS users

Enterprise macOS users are being targeted by attackers slinging new information-stealing malware dubbed MetaStealer. The MetaStealer malware MetaStealer is delivered within malicious disk image format (.dmg) files. The names of the files – such as Advertising terms of reference (MacOS…

The rise and evolution of supply chain attacks

A supply chain attack is a cyberattack that focuses on a third-party supplier providing essential services or software to the supply chain. In this Help Net Security video, Dick O’Brien, Principal Intelligence Analyst in the Symantec Threat Hunter team, discusses…

Serial cybersecurity founders get back in the game

“I didn’t really have a choice,” says Ben Bernstein, the former CEO and co-founder of Twistlock (acquired by Palo Alto Networks in 2019) and the CEO and co-founder of a new cybersecurity startup that is still in stealth. “Building a…

How should SMBs navigate the phishing minefield?

In this Help Net Security interview, Pete Hoff, CISO at Wursta, offers advice to SMB security leaders and professionals on how to minimize the threat phishing presents to their organization’s operations and long-term success. What makes phishing attacks particularly challenging…

Latest fraud schemes targeting the payments ecosystem

Threat actors continued to exploit technical misconfigurations through various fraud schemes, according to a new report from Visa. These include the use of malvertising and search engine optimization (SEO) techniques to cultivate compelling and effective phishing and social engineering campaigns,…

GCX launches GNSX in partnership with Palo Alto Networks

Global Cloud Xchange (GCX) has launched GNSX, a managed solution that delivers global end-to-end, zero trust hybrid networking coupled with real-time visibility, security, and control, all backed by user experience metrics and Experience Level agreements (XLAs). A seamless integration of…

CTERA Vault safeguards against risks related to data tampering

CTERA unveiled CTERA Vault, Write Once, Read Many (WORM) protection technology which provides regulatory compliant storage for the CTERA Enterprise Files Services Platform. CTERA Vault aids enterprises in guaranteeing the preservation and tamperproofing of their data, while also ensuring compliance…

Endace collaborates with Elastic to accelerate cyber threat response

Endace announced a technical partnership with SIEM and observability platform provider Elastic. The partnership brings together the EndaceProbe Scalable Hybrid Cloud Packet Capture, Elastic Stack and Elastic Security, and provides the packet-level network visibility and detailed network metadata that Security…

Requests via Facebook Messenger lead to hijacked business accounts

Hijackers of Facebook business accounts are relying on fake business inquiries and threats of page/account suspension to trick targets into downloading password-stealing malware. Examples of phishing messages. (Source: Guardio Labs) The campaign Hijacked Facebook business accounts a great way to…

Entrust names Jordan Avnaim as CISO

Entrust named Jordan Avnaim as its Chief Information Security Officer (CISO). With more than 20 years of experience leading information security functions and influencing change and enterprise digital transformation, Jordan will help scale and mature Entrust’s information security program for…

Strategies for harmonizing DevSecOps and AI

The same digital automation tools that have revolutionized workflows for developers are creating an uphill battle regarding security. From data breaches and cyberattacks to compliance concerns, the stakes have never been higher for enterprises to establish a robust and comprehensive…

17 free AWS cybersecurity courses you can take right now

Amazon Web Services (AWS) is the most extensive and widely-used cloud platform in the world, providing more than 200 services through global data centers. It serves millions of clients, ranging from startups to major corporations and government organizations. AWS has…

CISOs need to be forceful to gain leverage in the boardroom

Over 70% of CISOs feel that the importance of information security is not recognised by senior leadership, according to BSS. The CISOs said their top four highest investment priorities in 2023 are change management (35%), information security resilience (34%), data…

SecuX Shield BIO enhances crypto security

SecuX revealed its latest creation, the Shield BIO card-type hardware wallet. The Shield BIO combines biometric fingerprint authentication with the handy format of a credit card. At the heart of this wallet is the military-grade Secure Element chip, synonymous with…

The blueprint for a highly effective EASM solution

In this Help Net Security interview, Adrien Petit, CEO at Uncovery, discusses the benefits that organizations can derive from implementing external attack surface management (EASM) solutions, the essential capabilities an EASM solution should possess, and how it deals with uncovering…

Elevating API security to reinforce cyber defense

While APIs are essential to many operations and used extensively, a lack of prioritization and understanding is leading us towards a growing API security crisis, according to a report by Traceable AI and Ponemon Institute. The urgency for API security…

Empowering consumer privacy with network security

Every online interaction hinges on the bedrock of network security. With cyber threats and data breaches making headlines daily, businesses must understand how network security safeguards consumer privacy. In this Help Net Security video, Shawn Edwards, CSO at Zayo Group,…

Understanding the dangers of social engineering

Social engineering is a manipulative technique used by individuals or groups to deceive or manipulate others into divulging confidential or sensitive information, performing actions, or making decisions that are not in their best interest. It often involves exploiting human psychology…

Unpatched Cisco ASA flaw exploited by attackers (CVE-2023-20269)

A vulnerability (CVE-2023-20269) in Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD) firewalls is being exploited by attackers to gain access to vulnerable internet-exposed devices. “This vulnerability was found during the resolution of a Cisco TAC support…

New infosec products of the week: September 8, 2023

Here’s a look at the most interesting products from the past week, featuring releases from CyberSaint, Ghost Security, Hornetsecurity, NTT Security Holdings, and TXOne Networks. Reaper: Open-source reconnaissance and attack proxy workflow automation Reaper is an open-source reconnaissance and attack…

Best practices for implementing a proper backup strategy

Implementing a robust backup strategy for safeguarding crucial business data is more essential than ever. Without such a plan, organizations risk paying ransoms and incurring expenses related to investigations and lost productivity. In this Help Net Security video, David Boland,…

Druva unveils new security and cyber resilience capabilities for MSPs

Druva released its cyber resiliency offerings for Managed Service Providers (MSPs) globally. The Security Posture and Observability (SP&O) and Accelerated Ransomware Recovery (ARR) solutions enable Druva MSP partners to harness ransomware response and recovery capabilities to fortify their clients’ data…

AUCloud selects SentinelOne for government and business security

AUCloud has deployed SentinelOne’s Singularity Platform to keep its business operations and the critical digital infrastructure it supplies to some of the nation’s most trusted government agencies and enterprises safe. “As a growing cloud provider trusted by government agencies and…