For a while now, security researchers have been warning about fake human verification pages tricking Windows users into inadvertently installing malware. A recently exposed campaign showed how some users end up on these pages. Beware of fake human verification pages…
Tag: Help Net Security
Picus Security raises $45 million to help organizations reduce cyber risk
Picus Security announced it has closed a $45 million growth investment round led by Riverwood Capital with the participation of existing investor Earlybird Digital East Fund, bringing Picus’ total funds raised to $80 million. Picus has over 500 enterprise customers…
Patch this critical Safeguard for Privileged Passwords auth bypass flaw (CVE-2024-45488)
Researchers have released technical details about CVE-2024-45488, a critical authentication bypass vulnerability affecting One Identity’s Safeguard for Privileged Passwords (SPP), which could allow attackers to gain full administrative access to the virtual appliance. “Once an attacker has gained an authenticated…
Juniper extends AI-Native Networking Platform to maximize the full potential of Wi-Fi 7
Juniper Networks announced several key enhancements to its AI-Native Networking Platform that enable customers and partners to take full advantage of the emerging 802.11be amendment (Wi-Fi 7), which promises higher throughput, lower latency, extended range and greater reliability than previous…
Forescout for OT Security secures OT, IoT, and IT hybrid environments
Forescout announced its new SaaS Operational Technologies (OT) solution. Forescout for OT Security is a security solution that allows organizations to secure complex, heterogeneous OT, IoT/IoMT, and IT environments whether they are fully in cloud, completely air-gapped, or hybrid. Forescout…
FBI forced Flax Typhoon to abandon its botnet
A botnet operated by the Chinese state-sponsored threat actor known as Flax Typhoon has been disrupted by the law enforcement agency and abandoned by the group, FBI Director Chris Wray confirmed on Wednesday. “We executed court-authorized operations to take control…
Tenable Enclave Security enables discovery, assessment and analysis of IT assets
Tenable launched Tenable Enclave Security, a solution that supports the needs of customers operating in highly secure environments, such as those that are classified or otherwise air-gapped. Backed by Tenable Security Center, Tenable Enclave Security protects IT assets and modern…
Strivacity AI Assist optimizes digital identity management
Strivacity released Strivacity AI Assist, a new “smart assistant” powered by GenAI that makes it easier to manage and secure digital identities across business-to-business (B2B) and business-to-consumer (B2C) use cases. Building on Strivacity’s machine learning capabilities for fraud detection, Strivacity…
Edera raises $5 million to improve Kubernetes security
Edera announced it has raised $5 million in a seed round led by 645 Ventures and Eniac Ventures with participation from FPV Ventures, Generationship, Precursor Ventures and Rosecliff Ventures. Angel investors include Joe Beda, Filippo Valsorda, Mandy Andress, Jeff Behl…
How digital wallets work, and best practices to use them safely
With the adoption of digital wallets and the increasing embedding of consumer digital payments into daily life, ensuring security measures is essential. According to a McKinsey report, digital payments are now mainstream and continually evolving, bringing advancements and new data…
Differential privacy in AI: A solution creating more problems for developers?
In the push for secure AI models, many organizations have turned to differential privacy. But is the very tool meant to protect user data holding back innovation? Developers face a tough choice: balance data privacy or prioritize precise results. Differential…
Data disposal and cyber hygiene: Building a culture of security within your organization
Data breach episodes have been constantly rising with the number of data breach victims crossing 1 billion in the first half of 2024. A recent Data Breach Report 2023 by Verizon confirms that 74% of data breaches are due to…
Essential metrics for effective security program assessment
In this Help Net Security interview, Alex Spivakovsky, VP of Research & Cybersecurity at Pentera, discusses essential metrics for evaluating the success of security programs. Spivakovsky explains how automation and proactive testing can reveal vulnerabilities and improve overall security posture.…
Security leaders consider banning AI coding due to security risks
92% of security leaders have concerns about the use of AI-generated code within their organization, according to Venafi. Tension between security and developer teams 83% of security leaders say their developers currently use AI to generate code, with 57% saying…
Hackers breaching construction firms via specialized accounting software
Firms in the construction industry are getting breached by hackers via internet-exposed servers running Foundation accounting software, Huntress researchers are warning. “We’re seeing active intrusions among plumbing, HVAC, concrete, and similar sub-industries,” they noted. A way into corporate networks Ohio-based…
Komodor Klaudia identifies the root cause of issues in Kubernetes
Komodor announced Klaudia, a GenAI agent for troubleshooting and remediating operational issues, as well as optimizing Kubernetes environments. Integrated within the Komodor Kubernetes Management Platform, Klaudia simplifies and accelerates root-cause analysis, empowering both platform and application teams with precise diagnostics…
Ghost: Criminal communication platform compromised, dismantled by international law enforcement
Another encrypted communication platform used by criminals has been dismantled and its alleged mastermind arrested, the Australian Federal Police has announced on Tuesday. “AFP Operation Kraken charged a NSW man, aged 32, for creating and administering Ghost, a dedicated encrypted…
Critical VMware vCenter Server bugs fixed (CVE-2024-38812)
Broadcom has released fixes for two vulnerabilities affecting VMware vCenter Server that can be triggered by sending a specially crafted network packet, and could lead to remote code execution (CVE-2024-38812) or privilege escalation (CVE-2024-38813). “Broadcom is not currently aware of…
Fivetran Hybrid Deployment keeps sensitive data within the customer’s environment
Fivetran announced Hybrid Deployment, a new solution that allows customers to securely run data pipelines within their own environment from the Fivetran managed platform, providing a single control plane to manage all data sources, whether they are cloud-based SaaS apps…
PlainID introduces identity security for Zscaler
PlainID announces the PlainID Authorizer for Zscaler, available via PlainID SaaS Authorization Management, centralizes policy management for Zscaler and SaaS applications and tools. Zscaler and other SASE (Secure Access Service Edge) solutions have made significant strides in integrating identity-aware controls…