Category: Help Net Security

Attack Surface Management: Identify and protect the unknown

In this Help Net Security video, Brianna McGovern, Product Manager, Attack Surface Management, NetSPI, discusses Attack Surface Management (ASM). Attack Surface Management detects known, unknown, and potentially vulnerable public-facing assets and changes to your attack surface that may introduce risk.…

Combatting data governance risks of public generative AI tools

When companies utilize public generative AI tools, the models are refined on input data provided by the company. Regarding data security, unauthorized use of sensitive data or the accidental exposure of proprietary information can lead to reputational damage, legal consequences,…

20% of malware attacks bypass antivirus protection

Security leaders are concerned about attacks that leverage malware-exfiltrated authentication data, with 53% expressing extreme concern and less than 1% admitting they weren’t concerned at all, according to SpyCloud. However, many still lack the necessary tools to investigate the security…

Only 45% of cloud data is currently encrypted

39% of businesses have experienced a data breach in their cloud environment last year, an increase on the 35% reported in 2022, according to Thales. In addition, human error was reported as the leading cause of cloud data breaches by…

anecdotes Analysis Engine helps users detect gaps in their data

anecdotes launched Analysis Engine, empowering its customers to attain proactive GRC monitoring. With the introduction of the new engine, users gain access to robust analysis capabilities that automatically detect gaps in their data and provide deep visibility into their Compliance…

Same code, different ransomware? Leaks kick-start myriad of new variants

Threat landscape trends demonstrate the impressive flexibility of cybercriminals as they continually seek out fresh methods of attack, including exploiting vulnerabilities, gaining unauthorized access, compromising sensitive information, and defrauding individuals, according to the H1 2023 ESET Threat Report. Microsoft: An…

IDrive introduces Google Shared Drive backup

IDrive Backup announced the introduction of Google Shared Drive backup, which automatically detects and backs up all the shared drives available to the Super Administrator of the Google Workspace account. Shared drives, which are special folders in Google Drive that…

IronNet appoints Linda Zecher as CEO

IronNet’s Board of Directors has appointed Linda Zecher as Chief Executive Officer (CEO) effective immediately. Cameron Pforr, the company’s current Chief Financial Officer (CFO), has been appointed President of IronNet. GEN (Ret.) Keith Alexander will continue to serve as Chairman…

CIOs prioritize innovation over tech stack optimization

Despite economic obstacles and constraints on IT budgets, global CIOs maintain a positive outlook on the potential of technology to provide significant benefits for their organizations, according to Lenovo. Despite their optimism, the risks are real, as 83% are concerned…

Drata appoints Sydney Sloan as CMO

Drata announced the appointment of Sydney Sloan as the company’s first ever Chief Marketing Officer (CMO). Sloan will oversee global marketing at Drata to help market and brand leadership, fuel customer engagement, and accelerate the company’s commitment to delivering value…

Digilock introduces hardwired keyless lock solution

Digilock launched Pivot, hardwired built-in locks for new stationary furniture installations. Digilock brings its keyless lock experience to facilities requiring a hardwired power and data source for its permanent fixtures. Pivot Smart Locks are networked locks that operate with proprietary…

Perimeter 81 hires Gadi BenMark as CMO

Perimeter 81 announced the hiring of Gadi BenMark as Chief Marketing Officer. With more than 20 years experience in marketing strategy and business development across a variety of industries, BenMark brings extensive working knowledge to Perimeter 81. He reports to…

Owncast, EaseProbe security vulnerabilities revealed

Oxeye has uncovered two critical security vulnerabilities and recommends immediate action to mitigate risk. The vulnerabilities were discovered in Owncast (CVE-2023-3188) and EaseProbe (CVE-2023-33967), two open-source platforms written in Go. Owncast vulnerability (CVE-2023-3188) The first vulnerability was discovered in Owncast,…

Cybersecurity best practices while working in the summer

IT teams need help to monitor and enforce BYOD policies during summer months when more employees often travel or work remotely. In this Help Net Security video, Jeremy Ventura, Director, Security Strategy & Field CISO at ThreatX, discusses how employees…

Compliance seizes spotlight in the connected devices arena

Investment in connected device security has accelerated as upcoming legislation affecting the sector becomes more prominent, according to PSA Certified. This acceleration also highlights a noticeable difference from last year in the level of demand from industry customers and, more…

Law firms under cyberattack

In April 2023, Australian law firm HWL Ebsworth was hit by a cyberattack that possibly resulted in data of hundreds of its clients and dozens of government agencies being compromised. The attack was claimed by the Russian-linked ALPHV/Blackcat ransomware group.…

Malware delivery to Microsoft Teams users made easy

A tool that automates the delivery of malware from external attackers to target employees’ Microsoft Teams inbox has been released. TeamsPhisher (Source: Alex Reid) About the exploited vulnerability As noted by Jumpsec researchers Max Corbridge and Tom Ellson, Microsoft Teams’…

lockr Connections Hub blocks machine-generated emails

lockr launched Connections Hub to verify the authenticity of first-party datasets. Connections Hub expands lockr’s partnerships with publisher-focused data platforms such as CDPs and Clean Rooms, allowing publishers to easily assess and manage the impact of machine-generated emails on their…

API tools and services are fueling revenue growth

As more companies recognize APIs as the building blocks of modern software, API tools and services are evolving to meet their needs, according to Postman. Adopting an API-first approach “More companies are adopting an API-first approach to software development, and…

Is your browser betraying you? Emerging threats in 2023

Network attacks (IPS detections) have remained relatively flat over the last three quarters, technically down a bit more than 3%, according to WatchGuard. “Organisations need to pay more active, ongoing attention to the existing security solutions and strategies their businesses…

Scammers using AI voice technology to commit crimes

The usage of platforms like Cash App, Zelle, and Venmo for peer-to-peer payments has experienced a significant surge, with scams increasing by over 58%. Additionally, there has been a corresponding rise of 44% in scams stemming from the theft of…

ChatGPT’s unknown potential keeps us guessing

An overwhelming number of respondents familiar with ChatGPT were concerned about the risks it poses to security and safety, according to Malwarebytes. They also don’t trust the information it produces, and would like to see a pause in development so…

Promoting responsible AI: Balancing innovation and regulation

As AI technology advances, it is essential to remain mindful of familiar and emerging risks. Education is critical to fostering responsible AI innovation, as understanding the technology and its limitations raises standards and benefits everyone. In this Help Net Security…

HackGATE monitors activities of ethical hackers

Hackrate launched HackGATE, a monitoring platform specifically designed for ethical hacking projects. Thousands of IT security teams around the world struggle with efficiently monitoring ethical hacking projects and determining whether a test yielded a clear result because their systems are…

LTIMindtree V-Protect provides data protection for M365 workloads

LTIMindtree has launched a comprehensive cyber-recovery and data protection platform called ‘LTIMindtree V-Protect’, powered by Rubrik. LTIMindtree V-Protect is a offering from LTIMindtree which provides data protection and seamless recovery for M365 workloads such as Exchange, SharePoint, OneDrive, and Teams.…

75% of consumers prepared to ditch brands hit by ransomware

As 40% of consumers harbor skepticism regarding organizations’ data protection capabilities, 75% would shift to alternate companies following a ransomware attack, according to Object First. Consumers request data protection Furthermore, consumers request increased data protection from vendors, with 55% favoring…

How ransomware impacts the healthcare industry

Healthcare continues to be one of the most attractive targets for cyberattackers, and the number of breaches affecting the industry is increasing yearly. In this Help Net Security video, Steve Gwizdala, VP of Healthcare at ForgeRock, discusses how vigilance and…

Small organizations face security threats on a limited budget

Small organizations face the same security threats as organizations overall but have less resources to address them, according to Netwrix. Lack of budget among small organizations The most common security incidents are phishing, ransomware, and user account compromise. However, smaller…

53% of SaaS licenses remain unused

Enterprise leaders in procurement, IT, and finance need to take immediate action to rationalize their SaaS portfolios to prevent spending and governance challenges from spiraling out of control, according to Productiv. Productiv analyzed how nearly 100 million SaaS licenses were…

Fileless attacks increase 1,400%

Aggregated honeypot data, over a six-month period, showed that more than 50% of the attacks focused on defense evasion, according to Aqua Security. Threat actors avoid detection These attacks included masquerading techniques, such as files executed from /tmp, and obfuscated…

Infosec products of the month: June 2023

Here’s a look at the most interesting products from the past month, featuring releases from: 1Password, Bitdefender, Cequence Security, ConnectSecure, Cymulate, Cytracom, Datadog, Delinea, Edgescan, Enveedo, ESET, Index Engines, Island, iStorage, Lacework, NetApp, Netscout, Netskope, NinjaOne, Okta, Permit.io, PingSafe, Quantinuum,…

Short-staffed teams must find ways to do more with less

As more businesses experience resource and cost constraints, 86% of MSPs and MSSPs customers are outsourcing their security needs to consolidate security tools, according to OpenText. “Staffing issues that have plagued the security industry for years are getting worse due…

Total Assure launches to provide SMBs with managed security services

Total Assure announced its spinout from IBSS. Total Assure partners with its customers to identify security gaps, develop attainable cybersecurity objectives, and deliver comprehensive cybersecurity solutions that protect their businesses from modern cybersecurity threats. On account of the cybersecurity talent…

New infosec products of the week: June 30, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Cequence Security, Delinea, Index Engines, and NetApp. Delinea Privilege Manager enhancements reduce phishing effectiveness Based on Delinea’s deep expertise and customer feedback, the new Workstation…

Businesses are ignoring third-party security risks

In the dynamic business landscape where third-party relationships assume a critical role, organizations confront various risks that can profoundly affect their security and compliance requirements, according to Panorays. Even amidst tough economic times, the crucial nature of these risks necessitates…

Daon introduces AI.X technology to combat deepfake threats

Daon announces the addition of AI.X technology to expand the capabilities of its IdentityX and TrustX platforms. Designed for emerging identity threats from generative AI technology, AI.X includes pioneering technology that protects against deepfakes across voice, face, and document verification.…

Micropatches: What they are and how they work

In this Help Net Security video, Mitja Kolsek, CEO at Acros Security, discusses micropatches, a solution to a huge security problem. With micropatches, there are no reboots or downtime when patching and no fear that an official update will break…

Popular generative AI projects pose serious security threat

Many popular generative AI projects are an increased security threat and open-source projects that utilize insecure generative AI and LLMs also have poor security posture, resulting in an environment with substantial risk for organizations, according to Rezilion. Advancements in LLMs…

Guide: Attack Surface Management (ASM)

Attack surface expansion is a byproduct of doing business today, especially for enterprises that rely on the cloud. As businesses adapt and scale, the assets and platforms they use inevitably grow and change. This can result in attack surface exposures,…

Businesses count the cost of network downtime

Fewer than one in ten CIOs can claim that they have avoided a network outage, according to Opengear. This finding is among new research by Opengear of both CIOs and network engineers globally. The scale and frequency of network outages…