Tag: Help Net Security

GuardZoo spyware used by Houthis to target military personnel

Lookout discovered GuardZoo, Android spyware targeting Middle Eastern military personnel. This campaign leverages malicious apps with military and religious themes to lure victims via social engineering on mobile devices. While researchers are still actively analyzing data, thus far, they have…

Chinese APT40 group swifly leverages public PoC exploits

Chinese state-sponsored cyber group APT40 is amazingly fast at adapting public proof-of-concept (PoC) exploits for vulnerabilities in widely used software, an advisory released by intelligence and cybersecurity agencies from eight countries warns. The group, which is also known as Kryptonite…

Stellar Cyber Open XDR platform now supports BYODL

Stellar Cyber announced that the Stellar Cyber Open XDR platform now supports “Bring Your Own Data Lake” (BYODL). This seamless integration allows organizations that have standardized their data storage framework on Splunk, Snowflake, Elastic, or AWS security data lake, or…

Egnyte Copilot accelerates enterprise content collaboration

Egnyte launched Egnyte Copilot, its AI-driven assistant designed to accelerate and transform enterprise content collaboration. Egnyte Copilot enables Egnyte customers to start engaging in AI-powered conversations with their own private and trusted data through a simple, turnkey solution while keeping…

Outpost24 appoints Ido Erlichman as CEO

Outpost24 announced the appointment of Ido Erlichman as its new CEO, effective immediately. With over 20 years of experience in cyber security, technology and finance, Erlichman will bring a wealth of knowledge and a proven track record of leadership and…

Monocle: Open-source LLM for binary analysis search

Monocle is open-source tooling backed by a large language model (LLM) for performing natural language searches against compiled target binaries. Monocle can be provided with a binary and search criteria (authentication code, vulnerable code, password strings, etc.), and it will…

Infostealing malware masquerading as generative AI tools

Over the past six months, there has been a notable surge in Android financial threats – malware targeting victims’ mobile banking funds, whether in the form of ‘traditional’ banking malware or, more recently, cryptostealers, according to ESET. Vidar infostealer targets…

47% of corporate data stored in the cloud is sensitive

As the use of the cloud continues to be strategically vital to many organizations, cloud resources have become the biggest targets for cyberattacks, with SaaS applications (31%), cloud storage (30%) and cloud management infrastructure (26%) cited as the leading categories…