Rapid7 has unveiled Vector Command, a fully-managed offensive security service. Vector Command combines the external attack surface assessment capabilities of Rapid7’s recently launched Command Platform with continuous Red Teaming services by its internal experts to help customers identify and validate…
Tag: Help Net Security
Intezer raises $33 million to further develop its AI-based security operations solution
Intezer announced that it has raised $33 million in Series C funding, bringing its total capital raised to $60 million. The funding round was led by Norwest Venture Partners, with participation from all existing investors, including Intel Capital, OpenView, Magma,…
Verimatrix XTD Network Monitoring provides real-time detection of malicious activities
Verimatrix intoduced its Verimatrix XTD Network Monitoring feature, expanding its suite of application cybersecurity solutions to combat evolving network-related threats. Verimatrix XTD has long been at the forefront of identifying and neutralizing mobile app cyberthreats. The new Verimatrix XTD Network…
Hydden raises $4.4 million to improve identity security
Hydden announced that it has closed $4.4 million in seed funding led by Access Venture Partners. Other investors include Lockstep, the venture fund of CISOs Rinki Sethi and Lucas Moody, Service Provider Capital, and several cybersecurity angel investors including Andy…
CrowdSec: Open-source security solution offering crowdsourced protection
Crowdsec is an open-source solution that offers crowdsourced protection against malicious IPs. CrowdSec features For this project, the developers have two objectives: Provide free top-quality intrusion detection and protection software. There’s community participation in creating new detection rules as new…
Cybersecurity jobs available right now: September 18, 2024
Application Security Engineer CHANEL | France | On-site – View job details As an Application Security Engineer, you will perform application-focus, offensive, security assessments of existing and upcoming Chanel’s features and products. Enforce smart CI/CD security tooling (SAST, dependencies checker,…
The proliferation of non-human identities
97% of non-human identities (NHIs) have excessive privileges, increasing unauthorized access and broadening the attack surface, according to Entro Security’s 2025 State of Non-Human Identities and Secrets in Cybersecurity report. 92% of organizations expose NHIs to third parties, resulting in…
Detecting vulnerable code in software dependencies is more complex than it seems
In this Help Net Security interview, Henrik Plate, CISSP, security researcher, Endor Labs, discusses the complexities AppSec teams face in identifying vulnerabilities within software dependencies. Plate also discusses the limitations of traditional software composition analysis (SCA) solutions and the need…
Organizations overwhelmed by numerous and insecure remote access tools
Organizations are combating excessive remote access demands with an equally excessive number of tools that provide varying degrees of security, according to Claroty. Data from more than 50,000 remote-access-enabled devices showed that the volume of remote access tools deployed is…
Apple releases iOS 18, with security and privacy improvements
Apple has launched iOS 18, the latest significant iteration of the operating system powering its iPhones. Along with many new features and welcome customization options, iOS 18 brings several changes for improving users’ security and privacy. A standalone Passwords app…
WTW Indigo Vault secures business sensitive files
WTW has launched Indigo Vault, a document protection platform that provides advanced cybersecurity for sharing and storage of business sensitive files. The platform is a combination of cloud and local document management systems, that provides protection against insider threats, AI…
F5 NGINX One improves app delivery and security functions
F5 launched F5 NGINX One, combining advanced load balancing, web and application server capabilities, API gateway functionalities, and security features in a dedicated package. Customers are now able to simply manage and secure F5 NGINX instances and NGINX Open Source…
Veritas unveils AI-driven features to simplify cyber recovery
Veritas Technologies unveiled new AI-driven capabilities to further expand the strength and functionality of the Veritas cyber resilience portfolio. The new innovations, including AI-powered automation and user interface enhancements, provide data protection specialists and IT generalists with intelligent, easy-to-use solutions…
RunSafe Security raises $12 million to reduce attack surface in critical infrastructure
RunSafe Security announced the successful completion of a $12 million Series B funding round. This investment round, which includes participation from new and existing investors, will accelerate new product development and market expansion to EMEA and APAC. Continue ReadingThe investment round…
PoC exploit for exploited Ivanti Cloud Services Appliance flaw released (CVE-2024-8190)
CVE-2024-8190, an OS command injection vulnerability in Ivanti Cloud Services Appliance (CSA) v4.6, is under active exploitation. Details about the attacks are still unknown, but there may be more in the near future: Horizon3.ai researchers have published their analysis of…
Gcore WAAP protects websites, web applications, and APIs
Gcore launched Gcore WAAP, its end-to-end web application and API protection solution. Leveraging AI capabilities, Gcore WAAP integrates four products in one solution: web application firewall (WAF), application-layer DDoS protection, bot management, and API security, all managed through an intuitive…
Gateways to havoc: Overprivileged dormant service accounts
Service accounts are non-human identities used to automate machine-to-machine interactions. They support critical functions – such as running scripts, services, and applications like websites, APIs, and databases – and facilitate integrations, operating as a proxy to humans and supporting business…
Beyond human IAM: The rising tide of machine identities
Remember when managing user accounts was your biggest headache? Those were simpler times. Today, we’re drowning in a sea of machine identities, and it’s time to learn how to swim – or risk going under. In the ever-expanding universe of…
The growing danger of visual hacking and how to protect against it
In this Help Net Security interview, Robert Ramsey, CEO at Rain Technology, discusses the growing threat of visual hacking, how it bypasses traditional cybersecurity measures, and the importance of physical barriers like switchable privacy screens. Could you explain visual hacking…
The cybersecurity workforce of the future requires diverse hiring practices
The global cybersecurity workforce gap reached a new high with an estimated 4.8 million professionals needed to effectively secure organizations, a 19% year-on-year increase, according to ISC2. Despite the growing need for professionals, global workforce growth has slowed for the…