Sniffnet is a free, open-source network monitoring tool to help you easily track your Internet traffic. What sets it apart is its strong focus on user experience. Unlike most network analyzers, Sniffnet is built to be easily usable by everyone,…
Tag: Help Net Security
90% of threats are social engineering
In this Help Net Security video, Jakub Kroustek, Malware Research Director at Gen, discusses the Avast Q1 2024 Threat Report. The report highlights significant trends and incidents in cybersecurity. Key findings include: Surge in social engineering attacks: Nearly 90% of…
Chinese attackers leverage previously unseen malware for espionage
Sophos released its report, “Operation Crimson Palace: Threat Hunting Unveils Multiple Clusters of Chinese State-Sponsored Activity Targeting Southeast Asia,” which details a highly sophisticated, nearly two-year long espionage campaign against a high-level government target. During Sophos X-Ops’ investigation, which began…
78% of SMBs fear cyberattacks could shut down their business
94% of SMBs have experienced at least one cyberattack, a dramatic rise from 64% in 2019, according to ConnectWise. This increase in cyberattacks is exacerbated by the fact that 76% of SMBs lack the in-house skills to properly address security…
Vulnerability in Cisco Webex cloud service exposed government authorities, companies
The vulnerability that allowed a German journalist to discover links to video conference meetings held by Bundeswehr (the German armed forces) and the Social Democratic Party of Germany (SPD) via their self-hosted Cisco Webex instances similarly affected the Webex cloud…
Kali Linux 2024.2 released: 18 new tools, countless updates
Kali Linux 2024.2 is now available. It includes future package compatibility for 32-bit platforms, improvements to GNOME 46 and Xfce, and 18 new tools. Desktop changes Kali 2024.2 introduces GNOME 46, offering a refined experience that builds on the enhancements…
Zoho’s security stack improves businesses’ protections against breaches and attacks
Zoho Corporation announced new safeguards to its reinforced, tightly integrated security tech stack. Comprised of four solutions—Ulaa, Zoho Directory, Zoho OneAuth, and Zoho Vault—Zoho’s security stack provides businesses the highest level of protection against tracking, breaches, and attacks, without sacrificing…
Tines’ AI features enhance workflow automation for security and IT teams
Tines announced its first native AI features: Automatic Mode and AI Action. Customers are already experiencing a significant impact from these two new AI capabilities within the Tines platform by leveraging Large Language Models (LLMs) in a trustworthy way to…
Netskope introduces SaaS security enhancements to Netskope One for GenAI and SaaS collaboration
Netskope has unveiled SaaS security enhancements to Netskope One, its cloud-native platform that offers converged security and networking services to enable SASE and zero trust transformation. These new enhancements advance the platform’s Cloud Access Security Broker (CASB) module with additional…
Photos: Infosecurity Europe 2024
Infosecurity Europe is taking place at ExCel London from 4-6 June 2024. Help Net Security is on-site. This gallery takes you inside the event. The featured vendors are: Plainsea, Qualys, Akamai, Microsoft, Bridewell, Adaptive Shield, Jamf. The post Photos: Infosecurity…
Thales Passwordless 360° enables organizations to improve their identity management practices
Thales announced Passwordless 360°, a new concept for passwordless authentication which offers Thales customers the broadest coverage of passwordless function across multiple types of users and assurance levels. Passwordless 360° has the flexibility to let companies use the latest technologies…
Intel 471 launches 471 Attack Surface Protection to enhance external threat visibility
Intel 471 launched the company’s 471 Attack Surface Protection solution, an attack surface management (ASM) tool that provides its customers visibility into their external threat landscape and drives a proactive response that neutralizes threats and mitigates risk. Fueled by Intel…
TotalRecall shows how easily data collected by Windows Recall can be stolen
Ethical hacker Alexander Hagenah has created TotalRecall, a tool that demonstrates how malicious individuals could abuse Windows’ newly announced Recall feature to steal sensitive information. TotalRecall results (Source: Alexander Hagenah) Copilot+ Recall and its security pitfalls On May 20, Microsoft…
Verimatrix XTD Accessibility Abuse Detector identifies Android mobile app threats
Verimatrix introduced Verimatrix XTD Accessibility Abuse Detector service that builds upon its ongoing successful discoveries of notable Android security threats and provides much-needed GDPR protections. Verimatrix XTD and its suite of cybersecurity solutions have been helping customers identify Android mobile…
Appdome SDKProtect reduces third-party mobile supply chain risk
Appdome released a new mobile SDK protection and mobile threat streaming service, called Appdome SDKProtect. Appdome SDKProtect is designed to end third-party, mobile supply chain risk and democratize mobile threat intelligence and telemetry data among mobile SDK developers. The new…
N2WS launches cross-cloud volume restore for AWS and Azure
N2WS has introduced several new features to its cloud-native backup and disaster recovery (BDR) platform to help enterprises and managed service providers (MSPs) with combatting the increasing number of cybersecurity attacks on organizations while also ensuring data sovereignty, enhancing data…
No summer break for cybercrime: Why educational institutions need better cyber resilience
The education system isn’t equipped to handle today’s cyberthreats. I’m not just talking about cybersecurity education in schools shaping the technical workforce of the future – America’s schools themselves are prime targets for cybercrime today. In fact, according to some…
How AI-powered attacks are accelerating the shift to zero trust strategies
In this Help Net Security interview, Jenn Markey, Advisor to The Entrust Cybersecurity Institute, discusses the increasing adoption of enterprise-wide zero trust strategies in response to evolving cyber threats. Markey discusses the impact of emerging threats like AI-generated deepfakes and…
Find out which cyber threats you should be concerned about
This article includes excerpts from various reports that offer statistics and insights into the current cyber threat landscape. Human error still perceived as the Achilles’ heel of cybersecurity Proofpoint | 2024 Voice of the CISO | May 2024 Human error…
Cybersecurity jobs available right now: June 5, 2024
Corporate Data Protection Manager GLS | Germany | Hybrid – View job details As a Corporate Data Protection Manager, you will develop the Corporate Data Protection Framework with a special focus on compliance with the EU General Data Protection Regulation.…