Quantum Xchange launched version 4.0 of its quantum-safe key delivery platform Phio TX, featuring Phio VPN, a Virtual Private Network (VPN) to combine AI-native networking with quantum-safe key management and delivery. The Phio VPN builds on the unique architecture, design…
Tag: Help Net Security
Cybersecurity jobs available right now: June 19, 2024
Application Penetration Tester ShiftCode Analytics | USA | On-site – View job details As an Application Penetration Tester, you will perform Ethical Application Penetration Testing (EAPT) on web applications and APIs. Provide the vulnerability information in the predefined report format…
SELKS: Open-source Suricata IDS/IPS, network security monitoring, threat hunting
SELKS is a free, open-source, turnkey solution for Suricata-based network intrusion detection and protection (IDS/IPS), network security monitoring (NSM), and threat hunting. The project is developed and maintained by Stamus Networks. SELKS is an effective production-grade solution for many small…
Find out which cybersecurity threats organizations fear the most
This article compiles excerpts from various reports, presenting statistics and insights on cybersecurity threats faced by businesses and individuals alike. Cyber insurance isn’t the answer for ransom payments Veeam | 2024 Ransomware Trends Report | June 2024 Ransomware remains an…
Rising exploitation in enterprise software: Key trends for CISOs
Action1 researchers found an alarming increase in the total number of vulnerabilities across all enterprise software categories. “With the NVD’s delay in associating Common Vulnerabilities and Exposures (CVE) identifiers with CPE (Common Platform Enumeration) data, our report comes at a…
Atsign NoPorts establishes an encrypted IP tunnel directly between devices
Atsign introduces NoPorts to offer a secure remote access solution, exceeding current limitations and setting a new standard for secure connectivity. NoPorts establishes an encrypted IP tunnel directly between devices, eliminating the need for exposed ports and creating a zero-trust…
Medibank breach: Security failures revealed (lack of MFA among them)
The 2022 Medibank data breach / extortion attack perpetrated by the REvil ransomware group started by the attackers leveraging login credentials stolen from a private computer of an employee of a Medibank’s IT contractor. According to a statement by the…
Next DLP Secure Data Flow prevents data theft
Next DLP launched Secure Data Flow, a capability within the Reveal Platform that uses the “What, Where, Who and How” of data’s origin, movements and modifications to provide protection. Secure Data Flow overcomes the limitations and complexities of legacy Data…
NinjaOne MDM provides visibility and control over mobile devices
NinjaOne has expanded its platform with mobile device management (MDM). The new solution increases employee productivity and reduces complexity, risk, and costs for IT teams by managing Android and Apple mobile devices and endpoints within a single, intuitive console. With…
Fraudely empowers SMBs to protect their employees against phishing attacks
Fraudely announced a low-cost, setup-free solution to enable SMBs to immediately protect their employees against phishing attacks. Phishing scams remain one of the most prevalent cyber threats, costing businesses billions of dollars annually. These attacks attempt to trick employees into…
Veritas Data Insight classifies and controls unstructured data
Veritas Technologies announced better choice and flexibility for customers requiring data compliance solutions. Veritas Data Insight, which allows organizations to assess and mitigate unstructured and sensitive data compliance and cyber resilience risks, is now available in a software-as-a-service (SaaS) consumption…
Entro Security raises $18 million to scale its global operations
Entro Security announced it has closed an $18 million Series A round, led by Dell Technologies Capital with the participation of seed investors Hyperwise Ventures and StageOne Ventures, as well as angel investors such as Rakesh Loonkar and Mickey Boodaei.…
Critical RCE flaws in vCenter Server fixed (CVE-2024-37079, CVE-2024-37080)
VMware by Broadcom has fixed two critical vulnerabilities (CVE-2024-37079, CVE-2024-37080) affecting VMware vCenter Server and products that contain it: vSphere and Cloud Foundation. “A malicious actor with network access to vCenter Server may trigger these vulnerabilities by sending a specially…
eBook: The Art & Science of Secure Software Development
Software security requires a creative and disciplined approach. It involves having the vision to develop secure strategy, tactics, and execution. Excelling in the discipline demands thinking through the entire software lifecycle and enforcing security as a first-thought process. The global,…
SUSE announces Liberty Linux Lite for CentOS 7
SUSE announced a new SUSE Liberty Linux offering to help protect CentOS systems from future vulnerabilities. SUSE Liberty Linux Lite for CentOS 7 is a frictionless solution that provides customers with updates and security patches for their existing CentOS system,…
Datadog App Builder helps accelerate issue remediation
Datadog launched Datadog App Builder, a low-code development tool that helps teams create self-service applications and integrate them securely into their monitoring stacks. These customized apps help accelerate issue remediation at scale by enabling both technical and business users to…
How to create your cybersecurity “Google Maps”: A step-by-step guide for security teams
Cybersecurity isn’t just about firewalls and antivirus. It’s about understanding how your defenses, people, and processes work together. Just like Google Maps revolutionized navigation, process mapping can revolutionize how you understand and manage your security landscape. We used to wrestle…
Enhancing security through collaboration with the open-source community
In this Help Net Security interview, Alan DeKok, CEO at NetworkRADIUS, discusses the need for due diligence in selecting and maintaining open-source tools, and brings out the potential risks and benefits of collaborating with the open-source community to enhance software…
Mass exploitation is the new primary attack vector for ransomware
The cyber threat landscape in 2023 and 2024 has been dominated by mass exploitation, according to WithSecure. Edge service KEV vulnerability trends 64% of all edge service and infrastructure Common Vulnerabilities and Exposures (CVEs) in the Known Exploited Vulnerability Catalogue…
Preparing for a post-quantum future
Post-quantum cryptography (PQC) is a hot topic. A recent paper from Tsinghua University raised doubts about lattice-based cryptography for PQC, though an error was found. This has sparked questions about the strength of soon-to-be-standardized PQC algorithms. In this Help Net…