Category: Help Net Security

Kyndryl and SAP boost partnership to ease digital transformation

Kyndryl has expanded strategic partnership with SAP focused on developing new solutions to help customers solve their most complex digital business transformation challenges. Under their expanded collaboration, the companies have leveraged SAP Business Transformation Center and vast ERP systems know-how,…

Teradata collaborates with FICO to help customers reduce fraud

Teradata and FICO announced they plan to bring to market integrated advanced analytic solutions for real-time payments fraud, insurance claims, and supply chain optimization. Bringing data, analytics and insights together in one environment streamlines the development of solutions for use…

New Relic launches AWS Systems Manager Distributor integration

New Relic has announced an integration with AWS Systems Manager Distributor to provide a native experience to automatically deploy the New Relic monitoring infrastructure agent via the AWS Command Line Interface (CLI) and any AWS infrastructure-as-code (IaC) tooling to streamline…

Identity crimes: Too many victims, limited resources

The Identity Theft Resource Center (ITRC) has documented incidents of identity theft reported during 2022 and the first quarter of 2023, highlighting the use of strategies by criminals to convince people to willingly share protected information. The number of reported…

Acronis launches Advanced Security + EDR for MSPs

Acronis has announced the general availability of Acronis Advanced Security + Endpoint Detection & Response (EDR) for Acronis Cyber Protect Cloud. With new capabilities such as AI-based attack analysis, Acronis EDR reduces complexity and simplifies workflows for a more streamlined…

Boomi introduces Boomi AI to accelerate business transformation

Boomi has released Boomi AI – a conversational user experience that harnesses generative AI to connect and integrate applications, data, processes, people, and things across organizations – creating business outcomes faster than ever before. “The introduction of Boomi AI marks…

Barracuda SecureEdge strengthens security for businesses and MSPs

Barracuda Networks announced a new platform called Barracuda SecureEdge, a SASE solution that helps make hybrid and remote work easier to secure. Barracuda SecureEdge integrates Barracuda’s Secure SD-WAN, Firewall-as-a-Service, Zero Trust Network Access, and Secure Web Gateway capabilities. Using a…

Inseego and UScellular launch 5G indoor router FX3100

Inseego has launched the next-generation 5G indoor router FX3100, with UScellular. The new upgraded FX3100, which includes the Qualcomm Snapdragon X62 5G Modem-RF System, adds new capabilities to the current generation FX2000. The new FX3100 solution brings fast broadband internet…

Syam Nair joins Zscaler as CTO

Zscaler announced that Syam Nair has been appointed as the company’s Chief Technology Officer and EVP of Research and Development. In this role, Nair will be responsible for driving the research and development engines to expand Zscaler’s Zero Trust Exchange…

Entro raises $6 million to address secret-based breaches

Entro announced $6 million in seed funding led by StageOne Ventures and Hyperwise Ventures. Founded by CEO Itzik Alvas and CTO Adam Cheriki to address secret-based breaches, Entro continuously monitors and protects secrets and programmatic access to cloud services and…

Inactive Google accounts will be deleted

A week after Twitter announced it will be removing idle accounts after 30 days of inaction, Google has updated its account inactivity policy. Updates to the Google account inactivity policy Google says that the updated policy is effective immediately, but…

Preparing for federal supply chain security standardization

In 2021, the Biden Administration published the Executive Order on Improving the Nation’s Cybersecurity (EO 14028), setting off an agency-wide security initiative with the ultimate objective of standardizing security requirements across the Department of Defense (DoD) and the Federal Civilian…

The CIS Benchmarks Community consensus process

The Center for Internet Security (CIS) recently celebrated 20 years of bringing confidence to the connected world with consensus-based security guidance. The first CIS Benchmark was released in 2000. Today, there are more than 100 CIS Benchmarks configuration guidelines across…

Scality ARTESCA 2.0 strenghtens ransomware protection

Scality announced its newest release of Scality ARTESCA, its secure S3 object storage software for data deployments starting at a few terabytes. Over a dozen innovations in ARTESCA 2.0 strengthen cyber resiliency through a hardened, reduced attack surface that minimizes…

Leostream unveils ZTNA-enabled remote desktop access for AWS

Leostream has unveiled federated identity management with Zero-Trust Network Access (ZTNA) for secure remote computing. Built to protect and connect users across virtual desktop infrastructure (VDI), desktops-as-a-service (DaaS), and end-user computing (EUC) applications in Amazon Web Services (AWS) environments, the…

Confluent enhances Confluent Cloud to enforce data integrity

Confluent has unveiled new Confluent Cloud capabilities that give customers confidence that their data is trustworthy and can be easily processed and securely shared. With Data Quality Rules, an expansion of the Stream Governance suite, organizations can resolve data quality…

Lacroix manufacturing facilities shut down following cyberattack

French electronics manufacturer Lacroix closed three factories as a result of a cyberattack they “intercepted” over the weekend, the company has announced on Monday. Lacroix designs and produces electronic equipment for the automotive, home automation, aerospace, industrial and health sectors,…

WhatsApp allows users to lock sensitive chats

Meta has unveiled Chat Lock within WhatsApp, a feature that allows users to keep sensitive and intimate conversations safe from prying eyes. WhatsApp Chat Lock (Source: WhatsApp) Enabling Chat Lock By tapping on a one-to-one or group conversation, users can…

3 tips to accelerate zero trust adoption

Zero trust adoption is beginning to accelerate as networks get more complex. Gartner predicts that by 2026, 10% of large enterprises will have a comprehensive, mature, and measurable zero-trust program in place (compared to just 1% today). But adoption has…

Advantech’s industrial serial device servers open to attack

Three vulnerabilities in Advantech’s EKI series of serial device servers could be exploited to execute arbitrary commands on the OS level. Source: CyberDanube The vulnerabilities Serial device servers are networking devices that “network-enable” serial devices (e.g., printer, climate control system,…

Is human threat hunting a fool’s errand?

We all have witnessed automated advances creep into our modern threat hunting processes – and with good reason. As the rate of cyberattacks steadily increases, automated threat hunting processes are being integrated to help stem the tide by providing quicker…

SquareX’s vision: A future where internet security is a non-issue

With an ever-evolving landscape of cyber threats, the necessity for innovative, effective, and user-friendly security products has never been more apparent. Current security solutions, however, seem to lag behind, struggling to adequately address the challenges posed by increasingly sophisticated cyber-attacks.…

Bad bots are coming for APIs

In 2022, 47.4% of all internet traffic came from bots, a 5.1% increase over the previous year, according to Imperva. The proportion of human traffic (52.6%) decreased to its lowest level in eight years. Bad bot traffic For the fourth…

Criminal IP partners with DNS0.EU to combat cyber threats

AI Spera announced a data-sharing partnership agreement between its flagship search engine, Criminal IP, and DNS0.EU. This strategic collaboration makes perfect sense, as both entities share a common objective of providing the utmost protection against internet threats by blocking malicious…

Greatness phishing-as-a-service threatens Microsoft 365 users

Manufacturing businesses, healthcare organizations, and tech companies in English-speaking countries are the most targeted by phishers leveraging a relatively new phishing-as-a-service (PaaS) tool called Greatness, created to phish Microsoft 365 users. According to Cisco researcher, this tool has been utilized…

Top 3 trends shaping the future of cybersecurity and IAM

The need to protect sensitive information from unauthorized access and theft has never been greater, and cybersecurity and IAM technologies are evolving to meet this challenge while providing users with more convenience. There are three key trends to watch in…

New infosec products of the week: May 12, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Aqua Security, Feedzai, Nebulon, OpenVPN, Trua, and Zscaler. Aqua Security strengthens software supply chain security with pipeline integrity scanning Powered by eBPF technology, Aqua’s pipeline…

Fraud victims risk more than money

Digital fraud has significant financial and psychological repercussions on victims, according to Telesign. Businesses may find a new reason to fear digital fraud as the negative impacts of digital fraud on companies’ brand perception and the bottom line. Trust in…

DCI partners with DataVisor to help banks fight fraud

Financial fraud has increased substantially as the trend towards mobile banking and digitization accelerates. In 2022 alone, the Federal Trade Commission received over 1.1 million reports of identity theft and over 440,000 reports of credit card fraud. To help banks…

NETGEAR launches Nighthawk M6 Pro 5G WiFi 6E Hotspot Router

NETGEAR launched its latest innovation: the Nighthawk M6 Pro 5G WiFi 6E Hotspot Router (MR6550). With its 5G mmWave and WiFi 6E capabilities, this device delivers ultra-fast internet speeds and enhanced connectivity, powerful enough for remote business sites and portable…

Arlo improves physical security for Ping Identity employees

Arlo Technologies announced a partnership with Ping Identity, the intelligent identity solution for the enterprise. The new benefit will provide Ping Identity’s approximately 800 US employees with an Arlo Safe subscription to deliver comprehensive on-the-go personal, family and car safety.…

Absolute to be acquired by Crosspoint Capital Partners

Absolute Software has agreed to be acquired by venture capital firm Crosspoint Capital Partners in a deal with an enterprise value of $870 million. Under the terms of the Arrangement Agreement, Absolute shareholders will receive $11.50 per Common Share in…

Google notifies users about dark web exposure

Google has announced new tools, features and updates to improve users’ online safety, help them evaluate content found online, and alert them if their Gmail identity appears on the dark web. New tools and options for users A new tool…

CISOs confront mounting obstacles in tracking cyber assets

Monitoring assets in ever-changing settings operating in both development and production stages presents challenges. In this Help Net Security video, Daniel Deeney, CEO at Paladin Cloud, discusses how companies face difficulties identifying security threats within cloud environments. As businesses transition…

Refined methodologies of ransomware attacks

Adversaries were able to encrypt data in 76% of the ransomware attacks that were conducted against surveyed organizations, according to Sophos. The survey also shows that when organizations paid a ransom to get their data decrypted, they ended up additionally…

Feedzai ScamPrevent protects bank customers from financial scams

Feedzai announced significant enhancements to its RiskOps Platform, enabling banks to better protect their customers from a wide variety of financial scams. These new Feedzai ScamPrevent capabilities deliver detection, classification, and interception of the widest variety of payment scams and…

TruaID helps consumers keep personal information secure

Trua launched a new product called TruaID, which will give consumers a greater sense of security with their private information while providing businesses a more efficient means of screening customers and prospective employees. Simultaneously, Trua announced that it has branched…

Kasada and Signifyd join forces to combat eCommerce fraud

Kasada partners with Signifyd to help eCommerce providers deliver on their core business priorities to reduce fraud while improving the user experience. Together Kasada and Signifyd provide an impenetrable barrier against fraud. Kasada’s anti-bot platform stops automated online fraud before…