Category: Help Net Security

Imperva collaborates with Fortanix to provide end-to-end data security

Imperva and Fortanix signed a partnership agreement, and have each joined the other’s strategic partner program. This partnership brings together two innovative and trusted cybersecurity companies focused on multicloud data protection. The joint offerings from Imperva and Fortanix will provide…

Mobb raises $5.4 million and launches community tool

Mobb has raised $5.4M in seed funding led by Angel Investor Ariel Maislos and joined by MizMaa Ventures, Cyber Club London and additional investors from US, EU, and Israel. The company has also launched a free community version that allows…

AI tools like ChatGPT expected to fuel BEC attacks

Across all BEC attacks seen over the past year, 57% relied on language as the main attack vector to get them in front of unsuspecting employees, according to Armorblox. In other trends to watch, vendor compromise and fraud are rising…

Snowflake Manufacturing Data Cloud improves supply chain performance

Snowflake has launched the Manufacturing Data Cloud, which enables companies in automotive, technology, energy, and industrial sectors to unlock the value of their critical siloed industrial data by leveraging Snowflake’s data platform, Snowflake- and partner-delivered solutions, and industry-specific datasets. The…

Khoros and Cerby join forces to secure social media platforms

Khoros and Cerby new partnership allows brands to launch, manage, and analyze their social media profiles quickly and securely from the Khoros platform. Cerby brings security features such as single sign-on (SSO) directly into social accounts and ad accounts for…

UltraViolet Cyber launches to address the ever-expanding cyber threat

UltraViolet Cyber has unveiled its launch to provide organizations across the globe with a streamlined approach to address the ever-expanding cyber threat. Created through the combination of four pioneering firms — Metmox, Mosaic451, Stage 2 Security, and W@tchTower — UltraViolet Cyber…

Daon brings IdentityX to healthcare industry

Daon is expanding its IdentityX to the healthcare industry to enable organizations to safeguard identities for providers, staff, and patients. As the healthcare industry continues to digitize sensitive healthcare online information, cyber attacks increase and new regulations are established, Daon’s…

Cobalt Iron updates Compass platform with new data governance capabilities

Cobalt Iron has updated its Compass enterprise SaaS backup platform with new data governance capabilities comprising policy-based controls and an approval framework for decommissioning systems and deleting data. The automation and policy-based discipline for system decommissioning and associated data deletion…

WhatsApp announces features to prevent account takeover

WhatsApp will be rolling out three new security features in the coming months, to provide users with increased privacy and control over their messages and to help prevent unauthorized account access and takeover. The new features The first feature is…

Zelle users targeted with social engineering tricks

Cybercriminals have been leveraging social engineering techniques to impersonate the popular US-based digital payments network Zelle and steal money from unsuspecting victims, according to Avanan. The fake Zelle email (Source: Avanan) The phishing email The spoofed email is cleverly crafted…

New infosec products of the week: April 14, 2023

Here’s a look at the most interesting products from the past week, featuring releases from BigID, Binarly, Cynalytica, GitGuardian, Netskope, Searchlight Cyber, ThreatX, and Wazuh. Cynalytica OTNetGuard provides visibility into critical infrastructure networks Cynalytica has launced its Industrial Control System…

Conquering modern data stack complexities

How are data teams conquering the complexity of the modern data stack? Unravel Data has asked 350+ data scientists, engineers, analysts, and others who rely upon real-time data insights for decision-making to share their practices. “For the third year in…

Tactics that make crypto giveaway scams so successful

The illicit market for crypto giveaway scams has expanded, offering various services to facilitate fraudulent activity. The proliferation of fake crypto giveaways can be attributed to the increased availability of tools for scammers, even those with limited technical skills. In…

Cerbos Cloud manages and enforces authorization policies

Cerbos has released Cerbos Cloud, a managed service offering for Cerbos. Cerbos is an open source authorization layer to easily implement roles and permissions in software applications. It separates authorization logic from the core application code, making the authorization layers…

DirectDefense and Claroty join forces to secure XIoT environments

DirectDefense has partnered with Claroty which empowers organizations with visibility, protection, and threat detection to secure their Extended Internet of Things (XIoT), a vast network of cyber-physical systems across industrial, healthcare, and commercial environments. As digital transformation efforts have intensified…

Google delivers secure open source software packages

Google has announced the Google Cloud Assured Open Source Software (Assured OSS) service, which aims to be a trusted source of secure open source packages, and the deps.dev API, which provides access to security metadata for 50+ million open source…

LinkedIn now allows you to verify your workplace

To combat the surge of fake LinkedIn accounts in recent years, Microsoft has introduced Entra Verified ID, a new feature that allows users to verify their workplace on the business-focused social media platform. Verified ID automates verification of identity credentials…

The new weakest link in the cybersecurity chain

It used to be that people were the greatest cybersecurity vulnerability, but this is no longer true. The rise of the internet made people more connected than ever. Attackers capitalized on that fact and targeted employees directly to gain access…

Technology investments feel the impact of weakening economy

For the fifth consecutive month, IDC has lowered its 2023 forecast for worldwide IT spending as technology investments continue to show the impact of a weakening economy. 2023 forecast for worldwide IT spending In its monthly forecast for worldwide IT…

Searchlight Cyber launches Stealth Browser for secure dark web access

Searchlight Cyber has launched Stealth Browser, a virtual machine for cyber professionals to access the dark web and conduct investigations anonymously, without risk to themselves or their organization. Stealth Browser is an enhancement to Searchlight’s Cerberus investigation platform, which is…

CloudCasa for Velero manages and protects Kubernetes applications

CloudCasa by Catalogic launched CloudCasa for Velero, a new offering that combines the simplicity of the service and its advanced cloud awareness with the benefits of Velero. CloudCasa for Velero gives enterprises and service providers the ability to scale their…

Edgio Applications platform v7 accelerates developer team velocity

The Edgio Applications Platform v7 new integrated performance and security features are designed to increase organizational revenues and accelerate developer team velocity through better website performance and multi-layer security. Through the integrated, unified platform, Edgio reduces the need for multiple…

Armis and TrueFort collaborate to increase operational resilience

Armis has formed a strategic partnership and integration with TrueFort to empower customers by enriching the discovery, understanding, and enforcement of security policies for IT, Internet of Things (IoT), and operational technology (OT) environments. “Customers have shared with us just…

Raytheon and SpiderOak partner to secure satellite communications

Raytheon Technologies’ BBN division and SpiderOak have formed a strategic partnership to develop and field a new generation of zero-trust security systems for satellite communications in proliferated low-Earth orbit, or pLEO. SpiderOak’s OrbitSecure solution will be combined with Raytheon BBN’s…

Kodi forum breach: User data, encrypted passwords grabbed

The developers of Kodi, the widely used open-source media player app, have revealed a data breach of its user forum. What happened? The breach did not happen due to a vulnerability. Instead, an unknown attacker used the account of a…

3CX compromise: More details about the breach, new PWA app released

3CX has released an interim report about Mandiant’s findings related to the compromise the company suffered last month, which resulted in a supply chain attack targeting cryptocurrency companies. They discovered that: The attackers infected targeted 3CX systems with TAXHAUL (aka…

GitGuardian Honeytoken helps companies secure their software supply chains

GitGuardian launched its new Honeytoken module, providing intrusion detection, code leakage detection and helping companies secure their software supply chains against attackers targeting Source Control Management (SCM) systems, Continuous Integration Continuous Deployment (CI/CD) pipelines, and software artifact registries. “Honeytoken is…

Key factors driving changes in the perception of the CISO role

The CISO role is currently fraught with novel challenges and escalating workloads. This includes increased paperwork and time spent on risk assessments, which have surged from two to thirty hours per assessment. Furthermore, privacy regulations are expanding, and CISOs are…

Hybrid work environments are stressing CISOs

The impact of the hybrid workforce on security posture, as well as the risks introduced by this way of working, are posing concerns for CISOs and driving them to develop new strategies for hybrid work security, according to Red Access.…

Netskope Endpoint SD-WAN helps enterprises accelerate edge networking

Netskope unveiled its brand new Endpoint SD-WAN to provide secure, optimized access to endpoint devices from anywhere. Netskope Endpoint SD-WAN will leverage the industry’s first software-based unified SASE client, converging SD-WAN and Security Service Edge (SSE) capabilities so organizations can…

AutoRABIT expands Salesforce security posture management services

AutoRABIT has enhanced their data and metadata security offerings by refining existing products, adding new features, and emphasizing the importance of a full-featured approach to Salesforce DevSecOps. Security continues to be an increasingly difficult consideration. The advent of tools being…

11:11 Systems Managed SteelDome provides protection from ransomware attacks

11:11 Systems has revealed general availability of 11:11 Managed SteelDome in partnership with SteelDome Cyber. The fully managed service is designed for organizations in need of secure, scalable and cost-efficient storage of their unstructured, on-premises data. Leveraging SteelDome’s InfiniVault application…

Xerox improves productivity and security for hybrid workers

Xerox has unveiled new and upgraded solutions to improve productivity and security for hybrid workers. These include technologies designed for any organization to advance user experience, make the office a highly productive workplace choice, and enhance security wherever work happens.…

Trellix names Ash Parikh as CMO

In his role as Trelix’s CMO, Ash Parikh will lead global marketing teams to drive brand awareness, demand generation, and go-to-market strategies of the XDR market leader. “Trellix’s XDR platform is helping our customers bolster their cybersecurity programs,” said Bryan…

Flashpoint and Google Cloud expand partnership to deploy generative AI

Flashpoint has expanded its partnership with Google Cloud to deploy next-generation intelligence solutions, including generative AI, within the Flashpoint product suite. This initiative will revolutionize how organizations detect security threats and reduce risk, in support of better, faster, and more…

Microsoft patches zero-day exploited by attackers (CVE-2023-28252)

It’s April 2023 Patch Tuesday, and Microsoft has released fixes for 97 CVE-numbered vulnerabilities, including one actively exploited zero-day (CVE-2023-28252). About CVE-2023-28252 CVE-2023-28252 is a vulnerability in the Windows Common Log File System (CLFS) that allows attackers to gain SYSTEM…

Beware of companies offering paid sextortion assistance

Sextortion victims are already in a vulnerable position, and shady companies are taking advantage of this vulnerability to offer “sextortion assistance” services for huge sums – services that they may be unable to render or that won’t help the victims…

Syxsense platform updates simplify endpoint security and management

Syxsense has released new updates to the Syxsense product suite designed to extend automated workflow capabilities, improve usability, and enhance overall platform security. Key to this release is the introduction of Cortex Sequences, which uses the power of automation to…

ThreatX Runtime API & Application Protection goes beyond basic observability

ThreatX has unveiled ThreatX Runtime API & Application Protection (RAAP). This patent-pending capability goes beyond basic observability to extend threat detection, tracking and blocking to customers’ runtime environments, without slowing developers or requiring expertise in cloud-native applications. As organizations transition…

How to transform cybersecurity learning and make content more engaging

While applications like Slack and Teams have transformed how we collaborate and communicate, cybersecurity training has not kept pace with these advancements. Most security training is still being delivered through web-based learning management systems, according to CybSafe. Often, important security…

Making risk-based decisions in a rapidly changing cyber climate

Nicole Darden Ford is Global VP & CISO at Rockwell Automation. As the company’s cybersecurity leader, Nicole is entrusted to protect enterprise IT assets with scalable, future-ready platforms that enable the business. In addition to building cybersecurity programs for organizations…

Why it’s time to move towards a passwordless future

Adversaries don’t need to use sophisticated methods to gain access to enterprise systems or to deploy ransomware – they can just buy or steal credentials and log in. By burdening users with the near-impossible task of maintaining “secure passwords,” businesses…

Criminal businesses adopt corporate behavior as they grow

As criminal groups increase in size, they adopt corporate-like behavior, but this shift brings about its own set of challenges and costs, according to Trend Micro. “The criminal underground is rapidly professionalizing – with groups beginning to mimic legitimate businesses…

MSPs urged to refine security solutions in response to growing SMB needs

MSPs are focusing on automation and integration between their core tools to improve efficiency, service delivery and cost management, according to Kaseya. Automation, cybersecurity and integration About 90% of respondents hailed automation as a crucial technology for their business because…

Cybercriminals use simple trick to obtain personal data

People reveal more personal information when you ask them the same questions a second time – according to new research from the University of East Anglia. A new study reveals how simple repetition can make people over-disclose, and potentially put…

Rilide browser extension steals MFA codes

Cryptocurrency thieves are targeting users of Chromium-based browsers – Google Chrome, Microsoft Edge, Brave Browser, and Opera – with an extension that steals credentials and can grab multi-factor authentication (MFA) codes. The malicious extension Dubbed Rilide by Trustwave researchers, the…

Phishing emails from legit YouTube address hitting inboxes

Phishers are targeting YouTube content creators by leveraging the service’s Share Video by Email feature, which delivers the phishing email from an official YouTube email address (no-reply@youtube.com). How the YouTube phishing email scam works? The email informs the targets of…

Cyberthreats take a toll on IT teams’ work on other projects

93% of organizations find the execution of some essential security operation tasks, such as threat hunting, challenging, according to Sophos. IT professionals face challenging security operation tasks These challenges also include understanding how an attack happened, with 75% of respondents…

New infosec products of the week: April 7, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Guardz, Malwarebytes, Obsidian Security, and Stamus Networks. Malwarebytes unveils WorldBytes to help users reveal the hidden cyber threats around them Powered by Malwarebytes and AI…

Outcome-based cybersecurity paves way for organizational goals

Organizations follow a reactive approach to cybersecurity which is stifling their progress in demonstrating value and aligning with business outcomes, according to WithSecure. 83% of respondents surveyed in the study were interested in, planning to adopt, or expanding their adoption…

Workspot launches Cloud PC with 99.99% SLA availability

Workspot has launched Workspot Global Desktop, a capability that creates a way for enterprises to deliver end-user computing with the ultimate availability. Through a multi-cloud (private and public) and multi-region approach, the company provides enterprises with a Cloud PC that…

AuthenticID launches identity document liveness detector

AuthenticID has revealed the launch of its identity document liveness detector. This feature enhancement validates the actual, physical presence of identity documents when used as part of the identity verification process. AuthenticID’s identity document liveness detector utilizes advanced AI and…

LastPass Security Dashboard now features dark web monitoring

LastPass has expanded availability of its Security Dashboard and associated dark web monitoring and alerting, making it the only password manager providing proactive credential monitoring for all customers, including those using the product for free. The Security Dashboard is the…

ISACA updates CMMI model to increase its flexibility and adaptability

In a tightening economic market, addressing enterprise performance can help organizations better weather challenges by reducing costs, creating efficiencies, and coming in on schedule while improving overall quality. ISACA’s Capability Maturity Model Integration, or CMMI, has been doing just that…

Rorschach ransomware deployed by misusing a security tool

An unbranded ransomware strain that recently hit a US-based company is being deployed by attackers who are misusing a tool included in a commercial security product, Check Point researchers have found. The solution in question is Palo Alto Networks’ Cortex…

ImmuniWeb unveils major updates to its AI platform

To help customers stay ahead of the emerging cybersecurity threats, fulfill regulatory and compliance requirements, and implement intelligent automation to accelerate internal processes and reduce operational costs, ImmuniWeb has unveiled many updates. ImmuniWeb AI platform: New CI/CD and DevSecOps integrations…

IT and security pros pressured to keep quiet about data breaches

Organizations globally are under tremendous pressure to address evolving threats like ransomware, zero-day vulnerabilities, and espionage, and they face challenges in extending security coverage across multiple environments and dealing with an ongoing skills shortage, according to Bitdefender. “The results of…