Category: Help Net Security

NodeSource launches N|Solid Copilot to streamline app development

NodeSource has launched the N|Solid Copilot, an AI assistant integrated into the Console of N|Solid Pro. Leveraging the N|Solid Pro platform to capture the telemetry for applications and paired with the company’s Node.js experts and OpenAI, the N|Solid Copilot creates…

Photos: IRISSCON 2023

IRISSCON, the annual cybercrime-themed conference organized by the Irish Reporting and Information Security Service (IRISS), was held in Dublin, Ireland, on November 16, 2023. Here’s a peak on what went down: Deryck Mitchelson, Check Point Rik Ferguson, Forescout Networking Dave…

42Crunch and Microsoft partner for streamlined API security governance

42Crunch has unveiled the integration of 42Crunch’s API security audit and vulnerability testing solution with Microsoft Defender for Cloud to provide Microsoft customers continuous API protection from design to runtime. Cloud applications are increasingly API-centric, with APIs at the core…

Telemetry gaps leave networks vulnerable as attackers move faster

Telemetry logs are missing in nearly 42% of the attack cases studied, according to Sophos. In 82% of these cases, cybercriminals disabled or wiped out the telemetry to hide their tracks. Gaps in telemetry decrease much-needed visibility into organizations’ networks…

From PKI to PQC: Devising a strategy for the transition

Quantum computers capable of breaking currently used encryption algorithms are an inevitability. And since the US, China and Europe are sprinting to win that arms race, we know that day is coming sooner rather than later. Will organizations be ready…

Review: Cyberbunker: The Criminal Underworld

Written and directed by Kilian Lieb and Max Rainer, Cyberbunker is a Netflix documentary about a group of hackers that enabled the proliferation of dark web forums where illegal materials were bought and sold. Cyberbunker: The Criminal Underworld The documentary…

Cyber insurance predictions for 2024

In this Help Net Security video, Dara Gibson, Senior Cyber Insurance Manager at Optiv, discusses cyber insurance and what we should expect to see in 2024: Ransomware, BEC, and pixel privacy claims will remain at the forefront of cyber insurance…

AI helps leaders optimize costs and mitigate risks

AI is dominating the mindshare of IT leaders this year and next, as 72% believe their organization will be using more AI in the next two to three years, according to Snow Software. While AI may be the top priority…

The new imperative in API security strategy

Of the 239 vulnerabilities, 33% (79 out of 239) were associated with authentication, authorization and access control (AAA) — foundational pillars of API security, according to Wallarm. Prioritizing AAA principles Open authentication (OAuth), single-sign on (SSO) and JSON Web Token…

AppViewX SIGN+ strengthens software supply chain security

AppViewX launched AppViewX SIGN+, a flexible and secure code signing solution that enables DevOps teams to secure their software supply chain. With multiple deployment options, including code signing as a service, AppViewX SIGN+ seamlessly integrates into DevOps processes to enable…

Tanium and ServiceNow partner for complete asset visibility

Tanium and ServiceNow partnership provides complete asset visibility by combining Tanium’s real-time endpoint data and remediation with ServiceNow IT operations and security workflows. These two platforms empower automation across the entire estate, providing customers with a complete and accurate Configuration…

LastPass simplifies access to user data and information

LastPass announced the rollout of a new vault user interface (UI) on its iOS and Android mobile applications providing all users with easier, more streamlined access to data in their vaults. These changes unify the user experience with a modernized…

Viavi Solutions XhaulAdvisor accelerates O-RAN interoperability testing

Viavi Solutions announced the expansion of its NITRO Wireless portfolio with the addition of XhaulAdvisor, a scalable software solution offering real-time data for fronthaul verification, analysis, emulation and channel utilization. XhaulAdvisor enables Open RAN vendors, operators and OTIC labs to…

Living Security collaborates with Zscaler to manage human risk

Living Security announced a new partnership and technology integration with Zscaler. Joint customers will realize the benefits of secure internet and SaaS access, secure private access, and human risk quantification, enabling them to reduce risk. The majority of cybersecurity incidents…

TrustArc’s enhancements improve AI risk management for enterprises

TrustArc announced significant enhancements across its portfolio of products within the TrustArc Privacy Management Platform designed to enable organizations to implement accountable AI data privacy governance. As AI and machine learning continue to drive innovation and reshape numerous businesses, operations,…

ThreatModeler 7.0 brings AI to threat modeling

ThreatModeler released ThreatModeler, Version 7.0, bringing several new capabilities, including ThreatModeler WingMan (AI assistant), to help streamline the threat modeling process for software security and DevOps teams. ThreatModeler 7.0 enables faster and more consistent threat modeling with features such as…

Resecurity enhances cybersecurity in the Middle East

In a significant stride towards fortifying the cybersecurity landscape in the Middle East, Resecurity introduced its Digital Identity Protection (IDP) solution. This strategic move aligns with Resecurity’s commitment to creating a safer digital society and empowering individuals and businesses in…

Crypto asset discovery and the post-quantum migration

Quantum computing is reshaping our world and will revolutionize many industries, including materials science, life sciences, transportation, and energy. Google recently demonstrated the power of quantum computers by solving a problem in seconds that today’s supercomputers require nearly 50 years…

Enhancing mainframe security with proven best practices

Mainframe systems have served as the bedrock of enterprise networks for years, standing unmatched in terms of reliability, scalability, and data protection. However, security risks have become a pressing concern as the digital landscape evolves, emerging practices like DevOps, the…

Modeling organizations’ defensive mechanisms with MITRE D3FEND

Funded by the National Security Agency, MITRE’s D3FEND framework is helping to provide standardization, specificity, and repeatability needed by cybersecurity engineers. As the framework moves from the beta version to version 1.0 in 2024, we asked D3FEND creator Peter Kaloroumakis…

Generative AI is shaping future incident management processes

Persistent challenges in adhering to established incident management processes pose a significant risk to organizations, amplifying potential downtime costs amidst a surge in service incidents, according to Transposit. Despite a majority of respondents (59.4%) who have a defined incident management…

Danish energy sector hit by a wave of coordinated cyberattacks

The Danish energy sector has suffered what is believed to be the most extensive cyberattack in Danish history, according to SektorCERT. Danish energy sector under attack SektorCERT, an organization owned and funded by Danish critical infrastructure (CI) companies, uses a…

DirectDefense ThreatAdvisor 3.0 offers continuous security monitoring and management

DirectDefense launched ThreatAdvisor 3.0, its proprietary security orchestration, automation and response (SOAR) platform. Designed to improve the speed, efficiency, and accuracy of DirectDefense’s Security Operations Center (SOC), ThreatAdvisor 3.0 offers continuous security monitoring and management, automates manual processes, and includes…

Lacework unifies code and cloud security

Lacework announced its release of code security, which provides Lacework customers full visibility throughout the complete application development lifecycle. Lacework code security helps prevent security issues from getting into the wild by identifying them before code is deployed, and helps…

Juniper networking devices under attack

CISA has ordered US federal agencies to patch five vulnerabilities used by attackers to compromise Juniper networking devices, and to do so by Friday. Most of these bugs are not particularly severe by themselves, but they can be – and…

10 corporate cybersecurity blogs worth your time

In this article, we’ve curated a list of insightful corporate cybersecurity blogs that provide analysis and actionable advice to help you keep your company’s digital assets secure. This list is not meant to be exhaustive since thousands of companies have…

Collaborative strategies are key to enhanced ICS security

In this Help Net Security interview, Marko Gulan, Cyber Security Consultant at Schneider Electric, discusses the complexities of safeguarding industrial control systems (ICS). Our conversation will explore the importance of cross-departmental collaboration, balancing security with system functionality, and the dynamic…

k0smotron: Open-source Kubernetes cluster management

Open-source solution k0smotron is enterprise-ready for production-grade Kubernetes cluster management with two support options. Kubernetes cluster management Management and worker planes do not have to run on the same infrastructure provider, making k0smotron ideal for consolidating Kubernetes control planes for…

Using real-time monitoring to identify and mitigate threats

From identifying unusual behavior patterns to detecting unauthorized access, real-time monitoring provides a view of your digital environment, ensuring that threats are spotted and dealt with before they can cause harm. In this Help Net Security video, Costa Tsaousis, CEO…

The cloud skills gap is digital transformation’s Achilles’ heel

98% of organizations globally are facing a cloud skills gap, specifically in trying to find people with general cloud skills, cloud architecture knowledge, and adapting, monitoring, and troubleshooting for the cloud, according to a report by SoftwareOne. This is causing…

Qohash unveils remediation features for enhanced data security

Qohash introduces data remediation features to bolster organizations’ security and risk management. With this addition, the Qostodian platform now offers end-to-end security workflows, encompassing data discovery, monitoring, and remediation, to significantly enhance organizations’ security posture and risk management capabilities. Qostodian…

Resecurity integrates with Palo Alto Networks Cortex XSOAR Marketplace

Resecurity announced its integration with the Palo Alto Networks Cortex XSOAR Marketplace, a platform for security orchestration, automation, and response (SOAR). This integration allows Resecurity to offer three of its flagship products, Resecurity Context, Resecurity Risk, and Resecurity IDProtect, to…

Elliptic Labs releases AI Virtual Seamless Sensor

Elliptic Labs has launched its latest product, the AI Virtual Seamless Sensor. Elliptic Labs’ AI Virtual Seamless Sensor enables cross-device user experiences across different operating systems and chipset platforms, using a multi-modal approach to create interoperability between PCs, smartphones, peripheral…

The real cost of healthcare cybersecurity breaches

With each step towards digitalization, from cloud computing to electronic records, the healthcare sector faces mounting risks that threaten not just the privacy but the very wellbeing of patients. In this Help Net Security interview, Taylor Lehmann, Director, Office of…

Success eludes the International Counter Ransomware Initiative

A swing and a miss by the 50 member countries of the International Counter Ransomware Initiative (CRI), headlined by the US, who have confirmed a commitment to collectively address ransomware. Ransomware, as predicted, is growing at tremendous rates and focusing…

CISOs vs. developers: A battle over security priorities

A majority of both developers and CISOs view software supply chain security as a top priority in their roles (70% and 52% respectively), according to Chainguard. However, there is a clear disconnect and even some distrust between CISOs and developers…

Infostealers and the high value of stolen data

The risk of personal and professional data being stolen by nefarious actors looms larger than ever, according to Trend Micro. Understanding the risks associated with data theft, which include identity theft, financial loss, reputational harm, and the potential misuse of…

Why backup matters more than ever

Often overlooked but critically essential, backup lies at the core of data security and business continuity. However, data is also susceptible to a myriad of threats, ranging from hardware failures and accidental deletions to malicious cyberattacks. Whether you’re an individual…

Kubernetes adoption creates new cybersecurity challenges

To maintain a competitive edge, modern organizations are evolving toward highly scalable, flexible and resilient applications – leading to the widespread adoption of cloud native technologies like Kubernetes, according to Venafi. Security challenges in cloud native environments In fact, 84%…

SentinelOne integrates with Snyk for end-to-end app security

SentinelOne has partnered with Snyk to unveil the integration of SentinelOne’s Singularity Cloud Workload Security with the Snyk Developer Security Platform. The integration will correlate the cloud runtime threat detections identified by SentinelOne with vulnerabilities found by Snyk in container…

D2iQ DKP Insights identifies security issues in Kubernetes clusters

D2iQ released DKP Insights, an automated troubleshooting and diagnostic tool. DKP Insights, along with the newly released DKP AI Navigator, enables enterprise organizations to manage Kubernetes with ease and overcome the industry-wide skills gap that has presented the biggest barrier…

Chinese multinational bank hit by ransomware

The state-owned Industrial and Commercial Bank of China (ICBC), which is one of the largest banks in the world, has been hit by a ransomware attack that led to disrupted trades in the US Treasury market. The attack “On November…

New infosec products of the week: November 10, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Aqua Security, ARMO, Druva, IRONSCALES, Malwarebytes, and Varonis. Varonis enhances its Microsoft 365 offering to prevent sensitive email exposure Varonis announced major enhancements to its…

November 2023 Patch Tuesday forecast: Year 21 begins

The October forecast for large numbers of CVEs addressed in Windows 10 and 11 and the recent record on the number fixed in Windows Server 2012 was spot on! Microsoft addressed 75 CVEs in Windows 11, 80 in Windows 10,…

Data protection demands AI-specific security strategies

Adoption and use of AI tools is high across organizations, however many are concerned about the impacts AI will have on their larger data security strategy, according to Immuta. Only half of the respondents say their organization’s data security strategy…

How to withstand the onslaught of cybersecurity threats

“We brought a shovel to fight an avalanche.” That’s the sentiment shared by many business leaders, especially CISOs, CIOs and IT leaders as they face the current cybersecurity threat landscape. Like an avalanche, it’s constantly shifting and changing, moving quickly…

Rethinking cyber risk: The case against spreadsheets

In this Help Net Security video, Christina Hoefer, VP of Global Industrial Enterprise at Forescout, discusses why it is time for manufacturers/OT security leaders to “toss the spreadsheet” regarding their traditional methods of tracking data for cyber risk assessments. She…

Organizations lack the skills and headcount to manage Kubernetes

The Kubernetes industry is undergoing rapid change and evolution due to the growth of edge computing, the acceleration of AI, and the pressing need to modernize Kubernetes management in response to increasing technology scale and complexity, according to Spectro Cloud.…

Arista Networks expands zero trust networking architecture

Arista Networks announced an expanded zero trust networking architecture that uses the underlying network infrastructure to break down security silos, streamline workflows and enable an integrated zero trust program. Through a combination of Arista-developed technologies and strategic alliances with key…

Akamai and Deloitte partner for zero trust and incident response services

Akamai and Deloitte have announced a strategic alliance to provide zero trust microsegmentation and incident response services to Deloitte customers worldwide. This alliance will combine Deloitte’s expertise in cybersecurity, network forensics, and security with the Akamai Guardicore Segmentation solution. This…

NetRise Trace utilizes AI to Identify compromised software assets

NetRise has released Trace in the NetRise platform. This new solution allows users to identify and validate compromised and vulnerable third-party and proprietary software assets using AI-powered semantic search for the first time. Trace revolutionizes vulnerability detection and validation by…

Ivanti and Securin join forces to protect customers against cyber threats

Ivanti announced its partnership with a provider of tech-enabled cybersecurity solutions, Securin. Fueled by data from Securin’s Vulnerability Intelligence (VI), Ivanti Neurons for Vulnerability Knowledge Base provides authoritative, near-real-time vulnerability threat intelligence so security experts can expedite vulnerability assessments and…

Open-source vulnerability disclosure: Exploitable weak spots

Flaws in the vulnerability disclosure process of open-source projects could be exploited by attackers to harvest the information needed to launch attacks before patches are made available, Aqua Security researchers worry. The risk arises from “half-day” and “0.75-day” vulnerabilities “Half-day”…

Orange Business partners with VMware to improve employee productivity

Orange Business and VMware are strengthening their partnership to deliver Flexible SD-WAN with VMware as the first fully embedded SD-WAN offering in Evolution Platform. The Orange Business Evolution Platform combines a secured digital infrastructure with an agile, cloud approach to…

Security in the impending age of quantum computers

Quantum computing is poised to be one of the most important technologies of the 21st century. With global governments having collectively pledged more than $38 billion in public funds for quantum technologies and $2.1 billion of new private capital flowing…

Unpacking the challenges of anti-money laundering obligations

When managing anti-money laundering (AML) obligations, many challenger banks turn to basic or unproven in-house risk management solutions. Although these solutions can, in some ways, be innovative, they are often built quickly and lack thorough testing, leading to potential vulnerabilities.…

Tech leaders struggle to keep up with AI advances

New data reveals artificial intelligence is challenging organizations in significant ways, with only 15% of global tech leaders reporting they are prepared for the demands of generative AI and 88% saying stronger regulation of AI is essential, according to Harvey…

Commvault Cloud provides users with AI-driven threat prediction

Commvault announced Commvault Cloud, powered by Metallic AI – a new platform that is changing the game in how IT and security teams can radically improve cyber resilience in an era of non-stop ransomware and malicious cyberattacks. Commvault Cloud unifies…

Entrust and NEDAP partner for credential and ID program interoperability

Entrust has unveiled a technology alliance partnership with NEDAP to deliver interoperability between credential issuance and ID program management capabilities. Managing physical access for people, visitors and assets is complex and ever-evolving. Organizations seek access control programs that can provide…

Symmetrium releases IM and SMS data protection solution

Symmetrium has unveiled its Instant messaging (IM) and SMS data protection solution, which eliminates the corporate security and compliance risks associated with IM usage by employees. With messaging apps now part of daily life in many workplaces, Hackers can exploit…

Microsoft Authenticator suppresses suspicious MFA notifications

Microsoft has quietly rolled out a new mechanism that shields users of its mobile Authenticator app from suspicious (and annoying) push notifications triggered by attackers. Preventing attacks relying on MFA fatigue When faced with MFA-protected accounts, threat actors repeatedly try…