Category: Help Net Security

Photos: Black Hat USA 2023

Black Hat USA 2023 returned to the Mandalay Bay Convention Center in Las Vegas and Help Net Security was on-site. The conference featured over 100 selected Briefings, open-source tool demos in the Arsenal, a Business Hall, networking events, and more.…

New infosec products of the week: August 11, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Adaptive Shield, LastPass, NetSPI, Solvo, ThreatConnect, and Vicarius. NetSPI launches ML/AI Pentesting solution to help organizations build more secure models NetSPI has debuted its ML/AI…

Threat intelligence’s key role in mitigating malware threats

Malware, being one of the most prevalent and pervasive initial threat vectors, continues to adapt and become more sophisticated, according to OPSWAT. Crucial role of threat intelligence Threat actors leverage malware as an initial foothold to infiltrate targeted infrastructures and…

Fortra releases new integrations for its Offensive Security

Fortra has released new integrations for its offensive security solutions that streamline capabilities for vulnerability management, penetration testing, and red teaming. Working together, the solutions apply the same techniques used by threat actors to identify and exploit gaps in an…

Lookout SAIL improves efficiency for cybersecurity professionals

Lookout launched Lookout SAIL, a new generative artificial intelligence (gen AI) assistant that will reshape the way cybersecurity professionals interact with Lookout Mobile Endpoint Security and Lookout Cloud Security solutions and conduct cybersecurity analysis and data protection. In the rapidly…

Check Point to acquire Perimeter 81 for $490 million

Check Point signs a definitive agreement to acquire Perimeter 81, a Security Service Edge (SSE) company. With this acquisition, Check Point will help organizations accelerate the adoption of secure access across remote users, sites, cloud, datacentres, and the internet, all…

Bionic integrates with ServiceNow, launches Bionic Events

Bionic has unveiled a series of new product innovations to help enterprises manage application risk in production. Bionic has introduced a new ServiceNow Service Graph Connector that provides engineering and security teams with a real-time configuration management database (CMDB) of…

ConcealSherpaAI identifies potentially harmful webpages

Conceal introduced the ConcealSherpaAI engine, a secure browser extension powered by AI to identify potentially harmful webpages autonomously. By examining and evaluating metadata signals on a webpage, ConcealSherpaAI determines whether to quarantine, block, or permit access. The embedded artificial intelligence…

Microsoft 365 accounts of execs, managers hijacked through EvilProxy

A phishing campaign leveraging the EvilProxy phishing-as-a-service (PhaaS) tool has been spotted targeting Microsoft 365 user accounts of C-level executives and managers at over 100 organizations around the world. The rise of phishing-as-a-service As organizations increasingly employ multi-factor authentication (MFA),…

Will AI kill cybersecurity jobs?

Some ten years ago, the authors of The Second Machine Age wrote that “computers and other digital advances are doing for mental power—the ability to use our brains to understand and shape our environments—what the steam engine and its descendants…

What to know about FedRAMP Rev. 5 Baselines

In this Help Net Security video, Kaus Phaltankar, CEO at Caveonix, discusses how the recent approval of the FedRAMP Rev. 5 Baselines is a significant step forward in the cloud security and compliance domain. The implications for CSPs and third-party…

37% of third-party applications have high-risk permissions

Email attacks have increased in both sophistication and volume since the start of the year, according to Abnormal Security. Examining data since 2013, Abnormal identified a massive increase in third-party applications (apps) integrated with email, underscoring the proliferation of an…

Whistic introduces third-party risk management platform powered by AI

Whistic unveiled new artificial intelligence (AI) capabilities designed to transform the future of third-party risk management. The first in an ongoing rollout of leading-edge AI advancements, this announcement signals Whistic’s commitment to a unified assessment experience with artificial intelligence as…

Cymulate delivers threat-informed defense for cloud infrastructure

Cymulate announced innovations designed to deliver threat-informed defense through comprehensive exposure management and security validation for cloud infrastructure. The Cymulate Exposure Management and Security Validation platform now includes new and expanded cloud-focused attack simulation templates and resources to cover all…

Ghost Platform simplifies application security in the cloud

Ghost Security launched the Ghost Platform, a discovery and threat detection capability for modern, cloud-native applications. The Ghost Platform automatically uncovers every application and API associated with an organization, mapping and understanding the relationships each has to sensitive data, and…

BigID introduces Data Risk Assessment for hybrid environments

BigID has introduced its Data Risk assessment reporting capability. BigID’s Data Risk Assessment allows organizations to streamline data security posture reporting, providing comprehensive insights about their data risks and vulnerabilities with respect to sensitivity, volume, location, and accessibility in just…

Sonet.io blocks sensitive data from being pasted into ChatGPT

Sonet.io announced support for data loss protection, monitoring and observability capabilities for the generative AI era. Sonet.io will be able to detect when sensitive data is downloaded, uploaded, copied, pasted or typed into generative AI tools, allowing organizations to realize…

Google unveils stronger cellular security for Android 14

Google has revealed new cellular security mitigations that will be available for users and enterprises on its soon-to-be-released Android 14, and announced a new release schedule for Chrome Stable channel updates. Boosting network security on Android 14 Even though 2G…

Recent ransomware attacks share curiously similar tactics

A series of ransomware attacks made by different groups share curiously similar characteristics, according to Sophos. Sophos released new findings into the connections between the most prominent ransomware groups this past year, including Royal, in its Clustering Attacker Behavior Reveals…

Why cybersecurity is a blue-collar job

Cybersecurity has witnessed exponential growth in recent years, fueled by the increasing sophistication of cyber threats. As the demand for skilled professionals continues to surge, traditional approaches to education and job requirements are being challenged. In this article, I will…

SandboxAQ launches open-source meta-library of cryptographic algorithms

SandboxAQ launched Sandwich, an open-source framework that simplifies modern cryptography management and enables developers to steer their organizations towards cryptographic agility. With a unified API, Sandwich empowers developers to embed the cryptographic algorithms of their choice directly into their applications…

Code42 and Tines launch Incydr Flows to streamline workflows

Code42 Software has partnered with Tines to release Incydr Flows, powered by Tines. With the automation capabilities of Tines, the integration enables security teams to simplify manual, error-prone, and cross-functional workflows by automating actions between the Code42 Incydr solution and…

Abnormal Security CheckGPT detects AI-generated email attacks

Abnormal Security announced CheckGPT, a new capability to detect AI-generated email attacks. The new capability determines when email threats, including business email compromise (BEC) and other socially-engineered attacks, have likely been created using generative AI tools. Cybercriminals are constantly evolving…

North Korean hackers breached Russian missile development firm

North Korean state-sponsored hackers have breached Russian missile maker NPO Mashinostroyeniya, according to SentinelLabs researchers. North Korean hackers discovered The researchers came across leaked email communication between NPO Mashinostroyeniya’s IT staff that contained information about a possible cyber intrusion first…

ComplyCube ID Liveness Layer combats screen replay attacks

ComplyCube has enhanced its Document Authentication service to counter ‘screen replay attacks’, where scammers attempt to use IDs displayed on digital screens for illicit access to products and services. The announcement arrives in the context of a rise in identity…

Dark web activity targeting the financial sector

In this Help Net Security video, Jim Simpson, Director of Threat Intelligence at Searchlight Cyber, discusses threats against the financial sector. Threat actors will invariably target banks, yet by keeping an eye on the dark web, these institutions can identify…

How to get started with ongoing configuration assessments

There’s an old adage in business: if you’re not measuring something, you can’t manage it. These days, information technology (IT) and information security professionals know this all too well, especially when it comes to configuration assessments. Network performance requires constant…

Managing human cyber risks matters now more than ever

As artificial intelligence amplifies the sophistication and reach of phishing, vishing, and smishing attacks, understanding and managing human cyber risks has become increasingly vital, according to the SANS Institute. The report underscores the escalating stakes in human cyber risks, particularly…

Keystroke sounds can betray passwords

Researchers from several UK universities have proven that the recorded sounds of laptop keystrokes can be used to obtain sensitive user data such as passwords with a high accuracy. Sounds of keystrokes can reveal passwords, other sensitive data Side-channel attacks…

8 free cybersecurity documentaries you can watch right now

The line between physical and digital safety continues to blur, making cybersecurity a universal concern. The intricacies of cybersecurity can often feel esoteric, leaving many outside the industry feeling daunted. However, with increasing resources becoming available, getting a handle on…

Navigating the gray zone of ransomware payment practices

Ransomware remains a lucrative tool for cybercriminals as attackers continue to target a wide array of businesses. In response to this growing threat, an increasing number of organizations are compelled to meet ransom demands, perceiving it as their only viable…

Budget constraints threaten cybersecurity in government bodies

Government organizations are attractive targets for threat actors whose motivations may be geopolitical, financial, or disruption, according to BlackBerry. Because threat actors may include private individuals, small groups, or state-sponsored APT groups (which use APT tactics), government organizations must defend…

Unraveling the importance of software supply chain security

The software supply chain encompasses the entire lifecycle of a software product, from its conception and development to its distribution and deployment. It involves a complex network of suppliers, vendors, developers, integrators, and users, making it susceptible to many potential…

Week in review: AWS SSM agents as RATs, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Open-source penetration testing tool BloodHound CE released SpecterOps released version 5.0 of BloodHound Community Edition (CE), a free and open-source penetration testing solution that maps…

Top 12 vulnerabilities routinely exploited in 2022

Cybersecurity agencies from member countries of the Five Eyes intelligence alliance have released a list of the top 12 vulnerabilities routinely exploited in 2022, plus 30 additional ones also “popular” with attackers. The top 12 “In 2022, malicious cyber actors…

Kinetic MDR protects business data from cyber threats

Kinetic Business has launched a new cybersecurity product, Managed Detection and Response (MDR), designed exclusively for business customers. The all-in-one security solution protects business data, network, applications, and users from evolving and sophisticated cyber threats. As cyberattacks become more frequent…

New infosec products of the week: August 4, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Forescout, Menlo Security, Qualys, Sonar, SpecterOps, Synopsys, Traceable AI, and Lineaje. Open-source penetration testing tool BloodHound CE released SpecterOps released version 5.0 of BloodHound Community…

Multi-modal data protection with AI’s help

Cybersecurity risk is distinct from other IT risk in that it has a thinking, adaptive, human opponent. IT generally must deal with first order chaos and risk much like hurricanes in meteorology or viruses in biology: complex and dangerous –…

VPNs remain a risky gamble for remote access

Organizations are expressing deep concerns about their network security due to the risks from VPNs, according to a new Zscaler report. The report stresses the need for organizations to reevaluate their security posture and migrate to a zero-trust architecture due…

IaaS networking services revenue to hit $19.4 billion in 2023

The importance of networking to and within cloud environments has grown significantly for enterprise customers as more and more applications, workloads, and data are moved to the cloud, according to IDC. IDC estimates that worldwide revenue for public cloud-based infrastructure…