Category: Help Net Security

F5 fixes critical BIG-IP vulnerability (CVE-2023-46747)

F5 Networks has released hotfixes for three vulnerabilities affecting its BIG-IP multi-purpose networking devices/modules, including a critical authentication bypass vulnerability (CVE-2023-46747) that could lead to unauthenticated remote code execution (RCE). About CVE-2023-46747 Discovered and reported by Thomas Hendrickson and Michael…

Immuta Discover identifies and classifies sensitive data

Immuta released Immuta Discover, a new product for automated tagging and classification on cloud data platforms. Immuta Discover enables data teams to establish and maintain highly accurate metadata for the primary purpose of data access control, monitoring and regulatory compliance.…

Citrix Bleed: Mass exploitation in progress (CVE-2023-4966)

CVE-2023-4966, aka “Citrix Bleed”, a critical information disclosure vulnerability affecting Citrix NetScaler ADC/Gateway devices, is being massively exploited by threat actors. According to security researcher Kevin Beaumont’s cybersecurity industry sources, one ransomware group has already distributed a Python script to…

Logging Made Easy: Free log management solution from CISA

CISA launched a new version of Logging Made Easy (LME), a straightforward log management solution for Windows-based devices that can be downloaded and self-installed for free. CISA’s version reimagines technology developed by the United Kingdom’s National Cyber Security Centre (NCSC),…

Google expands bug bounty program to cover AI-related threats

Google has expanded its bug bounty program, aka Vulnerability Rewards Program (VRP), to cover threats that could arise from Google’s generative AI systems. Google’s AI bug bounty program Following the voluntary commitment to the Biden-⁠Harris Administration to develop responsible AI…

The dangers of dual ransomware attacks

At some point in the movie “Groundhog Day,” Phil Connors breaks his bedside radio when he is woken up (yet again) by the song “I Got You Babe”. This déjà vu seems to await companies that fall victim to ransomware…

Finding the right approach to security awareness

As artificial intelligence amplifies the sophistication and reach of phishing, vishing, and smishing attacks, understanding and managing human cyber risks has become increasingly vital. Security awareness training is essential and must be a live, evolving process. In this Help Net…

IoT’s convenience comes with cybersecurity challenges

The rapid proliferation of Internet of Things (IoT) devices has ushered in a new era of connectivity and convenience, transforming the way we live and work. However, this interconnectivity has also given rise to a host of cybersecurity challenges and…

TeamViewer Tensor enhancements improve security and productivity

TeamViewer announced a major update of its enterprise connectivity solution TeamViewer Tensor, supporting IT departments in maintaining business-critical equipment. With leading compatibility, security and performance, TeamViewer Tensor offers a comprehensive overview of all devices, improving monitoring and support as well…

Apple news: iLeakage attack, MAC address leakage bug

On Wednesday, Apple released security updates for all supported branches of iOS and iPadOS, macOS, tvOS, watchOS and Safari. This time around, the updates did not garner as much attention as when they deliver a zero-day fix, though it has…

Raven: Open-source CI/CD pipeline security scanner

Raven (Risk Analysis and Vulnerability Enumeration for CI/CD) is an open-source CI/CD pipeline security scanner that makes hidden risks visible by connecting the dots across vulnerabilities woven throughout the pipeline that, when viewed collectively, reveal a much greater risk than…

New infosec products of the week: October 27, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Darktrace, Data Theorem, Jumio, Malwarebytes, Progress, and Wazuh. Progress Flowmon ADS 12.2 AI offers advanced security event monitoring Flowmon ADS 12.2 harnesses the power of…

AI strengthens banking’s defense against fraud

Consumers are ready for the next wave of payment technology, including deployment of AI-driven biometrics to verify identity in digital-first account opening processes, according to Entrust. The key to future payment solutions 63% of respondents indicated that they are comfortable…

SMBs at risk as AI misconceptions lead to overconfidence

Despite advancements in IT security measures, SMBs remain firmly in the crosshairs of cybercriminals, according to Devolutions. Ransomware payments and IoT malware incidents soar Spikes in incidents such as ransomware payments and IoT malware attacks indicate that this year has…

AI-related security fears drive 2024 IT spending

Worldwide IT spending is projected to total $5.1 trillion in 2024, an increase of 8% from 2023, according to Gartner. 2024 set to see strong public cloud spending growth While generative AI has not yet had a material impact on…

At-Bay Stance MDR improves cyber resilience for SMBs

At-Bay launched At-Bay Stance Managed Detection and Response (At-Bay Stance MDR), a new MDR solution designed to help emerging and mid-sized businesses advance their security defenses and threat preparedness in light of rising cyber crime rates. By analyzing its claims…

Progress Flowmon ADS 12.2 AI offers advanced security event monitoring

Progress has unveiled the latest release of its network anomaly detection system, Progress Flowmon ADS. Flowmon ADS 12.2 harnesses the power of artificial intelligence (AI) to provide an advanced and holistic view of detected security events, empowering cybersecurity professionals to…

Tufin Orchestration Suite R23-2 helps enterprises to fully optimize SASE approach

Tufin released Tufin Orchestration Suite (TOS) version R23-2. The latest edition streamlines Secure Access Service Edge (SASE) policy management across an organization’s hybrid network, expedites security audits and compliance efforts, and enhances application connectivity triage, offering organizations a comprehensive solution…

Seemplicity integrates with Wiz to accelerate remediation

Seemplicity announced its technical integration with cloud security provider Wiz. As a certified Wiz Integration (WIN) platform partner, Seemplicity enables joint customers to seamlessly integrate its Security Remediation Operations platform into their existing Wiz workflows to accelerate remediation. “Today security…

Quishing: Tricks to look out for

QR code phishing – aka “quishing” – is on the rise, according to HP, Darktrace, Malwarebytes, AusCERT, and many others. What are QR codes? QR codes are two-dimensional matrix barcodes used for tracking products, identifying items, simplifying actions such as…

OT cyber attacks proliferating despite growing cybersecurity spend

The sharp increase in attacks on operational technology (OT) systems can be primarily attributed to two key factors: the escalating global threats posed by nation-state actors and the active involvement of profit-driven cybercriminals (often sponsored by the former). The lack…

Ransomware groups continue to increase their operational tempo

Q3 of 2023 continued an ongoing surge in ransomware activity, according to GuidePoint Security. GuidePoint Research and Intelligence Team (GRIT) observed a nearly 15% increase in ransomware activity since Q2 due to an increased number of ransomware groups, including 10…

Malwarebytes Identity Theft Protection defends users against online threats

Malwarebytes launched a new consumer solution, Identity Theft Protection. The new service helps individuals secure their digital identities and defend against identity and online threats. Malwarebytes Identity Theft Protection includes real-time identity monitoring and alerts,credit protection and reporting and live…

Teleport Identity Governance and Security reduces attack surface area

Teleport released Teleport Identity Governance and Security, a product that secures and governs services, and user identities across multiple clouds, environments and SaaS applications. This new product reduces attack response times by providing customers with a control plane that maps…

VMware patches critical vulnerability in vCenter Server (CVE-2023-34048)

VMware has fixed a critical out-of-bounds write vulnerability (CVE-2023-34048) and a moderate-severity information disclosure flaw (CVE-2023-34056) in vCenter Server, its popular server management software. About CVE-2023-34048 and CVE-2023-34056 CVE-2023-34048 allows an attacker with network access to a vulnerable vCenter Server…

Security leaders have good reasons to fear AI-generated attacks

Generative AI is likely behind the increases in both the volume and sophistication of email attacks that organizations have experienced in the past few months, and it’s still early days, according to Abnormal Security. Their leading worry is the increased…

Strategies to overcome cybersecurity misconceptions

Many CISOs may believe their cybersecurity defenses are robust enough to repel any attack, but there are critical misconceptions they may be harboring. In this Help Net Security video, Kevin Kirkwood, Deputy CISO at LogRhythm, stresses that one of the…

Consumers are taking action to protect their privacy

Younger consumers are taking deliberate action to protect their privacy, as 42% of consumers aged 18-24 exercise their Data Subject Access Rights, compared with just 6% for consumers 75 and older, according to Cisco. Consumers express willingness to share their…

Lacework increases operational efficiency around risk management

Lacework announced a series of updates that expand the platform’s enterprise-grade capabilities to help customers do more in the cloud, securely. Lacework is extending its platform support to new cloud providers in order to give customers more choice as they…

Versa Secure SD-LAN delivers zero trust and IoT security

Versa Networks announced Versa Secure SD-LAN, a software-defined branch and campus Local Area Network (LAN) solution to deliver zero trust and IoT security natively at the LAN Edge. This software-defined approach makes campus and branch networks more agile and integrated,…

Semgrep Secrets prevents sensitive credentials from leaking

Semgrep announced its public beta of Semgrep Secrets, a product for detecting and securing sensitive credentials during the software development process. Semgrep is designed for engineers – software and security alike – who need to maintain a fast cadence of…

Drata unveils platform enhancements to automate GRC processes

Drata launched two highly anticipated capabilities: Role-Based Access Control (RBAC) and User Access Reviews (UAR). The addition of Role-Based Access Control enables even more partitioned access to various elements of the Drata platform to better manage compliance programs. And with…

Island raises $100 million, boosts valuation to $1.5 billion

Island has raised $100 million in its Series C financing round, which values Island at $1.5 billion. The round was led by Prysm Capital and joined by Canapi Ventures, as well as Island’s current funding partners Insight Partners, Stripes, Sequoia,…

1Password also affected by Okta Support System breach

Following in the footsteps of BeyondTrust and CloudFlare, 1Password has revealed that it has been affected by the Okta Support System breach. “On September 29, we detected suspicious activity on our Okta instance that we use to manage our employee-facing…

The primary pain points for SOC teams

Security professionals want to pursue high-impact work, but they’re being held back by growing workloads, shrinking budgets, and a worsening skills shortage, according to Tines. Nine out of 10 security teams are automating at least some of their work, and…

Wazuh: Free and open-source XDR and SIEM

Wazuh is an open-source platform designed for threat detection, prevention, and response. It can safeguard workloads in on-premises, virtual, container, and cloud settings. Wazuh system comprises an endpoint security agent installed on monitored systems and a management server that processes…

Today’s CIO has ambitions well beyond IT delivery

45% of CIOs are beginning to work with their CxO peers to bring IT and business area staff together to co-lead digital delivery on an enterprise-wide scale, according to Gartner. CIOs face a paradigm shift, sharing leadership responsibilities with CxOs…

Reusable Persona stores PII for reuse across any device or browser

Persona launched a new addition to its suite of identity solutions, “Reusable Personas”. Leveraging Passkeys, the new release enables users to securely store their Personal Identity Information (PII) for reuse across any device or browser, without having to re-submit the…

Unit21 Real-Time Monitoring empowers users to identify potential fraud

Unit21 launches Real-Time Monitoring to fight real-time fraud and transform the landscape of risk management. With Real-Time Monitoring, fraud prevention teams gain unprecedented capabilities to monitor real-time transactions which allows for proactive fraud prevention, resulting in significant reductions in fraud-related…

Navigating OT/IT convergence and securing ICS environments

Escalating threats to operational technology (OT) have prompted an increasing number of global enterprises to adopt sophisticated technologies and services to enhance the security of their assets. In this Help Net Security video, Christopher Warner, Senior GRC-OT Security Consultant at…

How passkeys are changing the face of authentication

As passwordless identity becomes mainstream, the term “passkey” is quickly becoming a new buzzword in cybersecurity. But what exactly is a passkey and why do we need them? A passkey is a digital credential that can only be used by…

Scaling rapidly? Your application security strategies need to keep up

Modern application security strategies must support and enable modern software development, even as it rapidly scales, according to Mend.io. Just 52% of companies can effectively remediate critical vulnerabilities and only 41% are confident they can manage the security and compliance…

Only a fraction of risk leaders are prepared for GenAI threats

While 93% of companies recognize the risks associated with using generative AI inside the enterprise, only 9% say they’re prepared to manage the threat, according to Riskonnect. The research reveals a profound AI risk management gap: To date, only 17%…

Cyberattacks put healthcare organizations on high alert

Healthcare organizations have become prime targets for cybercriminals due to the immense value of their data, including patient records, sensitive medical information, and financial data. The importance of protecting this invaluable information, alongside ensuring the seamless operation of medical devices…

Researchers uncover DarkGate malware’s Vietnamese connection

WithSecure researchers have tracked attacks using DarkGate malware to an active cluster of cybercriminals operating out of Vietnam. DarkGate is a remote access trojan (RAT) that has been used in attacks since at least 2018 and is currently available to…

New infosec products of the week: October 20, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Arcitecta, AuditBoard, BackBox, Prevalent, and Thales. Thales introduces SafeNet IDPrime FIDO Bio Smart Card The SafeNet IDPrime FIDO Bio Smart Card facilitates end user adoption…

Legacy authentication leads to growing consumer frustration

Despite widespread usage of passwords lingering on, consumers want to use stronger, more user-friendly alternatives, according to FIDO Alliance. Entering a password manually without any form of additional authentication was the most commonly used authentication method across the use cases…

The double-edged sword of heightened regulation for financial services

Financial services organizations are enticing targets for cybercriminals due to their significant wealth holdings, presenting abundant opportunities for monetary gain through extortion, theft, and fraud, according to Trustwave. In addition to the money itself, the financial services sector stores large…

GenAI investments surge, anticipated to hit $143 billion by 2027

Enterprises will invest nearly $16 billion worldwide on GenAI solutions in 2023, according to IDC. This spending, which includes GenAI software and related infrastructure hardware and IT/business services, is expected to reach $143 billion in 2027 with a compound annual…

Druva launches Dru to make data protection more autonomous

Druva unveiled Dru, an AI copilot for backup that improves how customers engage with their data protection solutions. Dru allows both IT and business users to get critical information through a conversational interface, helping customers reduce protection risks, gain insight…

Zumigo unveils QR code for passwordless login

Zumigo launched a functionality within the Zumigo Assure Authentication product that facilitates the transfer of verified trust from a user’s mobile phone to a desktop, laptop and tablet. The functionality is made possible with a crucial new feature – using…

Zumigo introduces QR code for passwordless login

Zumigo launched a functionality within the Zumigo Assure Authentication product that facilitates the transfer of verified trust from a user’s mobile phone to a desktop, laptop and tablet. The functionality is made possible with a crucial new feature – using…

Sumsub For Fake’s Sake combats deepfake and synthetic fraud

Sumsub released For Fake’s Sake, a set of models enabling the detection of deepfakes and synthetic fraud in visual assets. Following this initial contribution, Sumsub will leverage feedback from the AI-research community to further improve the models’ capabilities. Sumsub has…

itemis and Cybellum partner to enhance product software security

itemis and Cybellum formed a partnership to provide comprehensive cybersecurity solutions for the automotive industry. Drawing on their respective expertise, they have established a formidable alliance that will allow OEMs & Tier-N suppliers to better secure their connected products. The…

Mastercard enhances its solutions using AI technology

With the relentless demand on banks to maintain consumer trust in an ever-evolving payments landscape, Mastercard has launched a new suite of enhanced solutions using AI to help them make good on the promise of ‘always-on’ payments. With millions of…

Google Play Protect takes on malicious apps with code-level scanning

Google is enhancing Google Play Protect’s real-time scanning to include code-level scanning, to keep Android devices safe from malicious and unwanted apps, especially those downloaded (or sideloaded) from outside of the Google Play app store – whether from third-party app…

Google ads for KeePass, Notepad++ lead to malware

Users using Google to search for and download the KeePass password manager and the Notepad++ text editor may have inadvertently gotten saddled with malware, says Jérôme Segura, Director of Threat Intelligence at Malwarebytes. Malvertising via search engine ads is a…