Veeam Software introduced Veeam Data Cloud Vault, a cloud-based storage service that enables users to securely store backup data not only off-site, but in an always-immutable and encrypted format, providing additional layers of protection for critical information. Enterprises can leverage…
Tag: Help Net Security
LOKKER Consent Verification identifies potential compliance issues
LOKKER released Consent Verification, a new tool in LOKKER’s Privacy Edge Platform that gives businesses a simple way to check whether their consent banners are properly configured and working correctly. LOKKER’s recent research found that more than 90% are not.…
PoC for Progress Telerik RCE chain released (CVE-2024-4358, CVE-2024-1800)
Security researchers have published a proof-of-concept (PoC) exploit that chains together two vulnerabilities (CVE-2024-4358, CVE-2024-1800) to achieve unauthenticated remote code execution on Progress Telerik Report Servers. Telerik Report Server is a centralized enterprise platform for report creation, management, storage and…
ManageEngine unveils passwordless, phishing-resistant FIDO2 authentication
ManageEngine launched passwordless, phishing-resistant FIDO2 authentication for enterprise applications in ADSelfService Plus, its on-premises identity security solution, and the launch of endpoint MFA for Windows machines and elevated system actions in Identity360, its cloud-native identity management platform. Identity-first security: A…
SailPoint Risk Connectors helps organizations identify and act on risks
SailPoint has announced a new offering on its Atlas platform, SailPoint Risk Connectors. As part of its Atlas platform, SailPoint Risk Connectors makes it easier for organizations to make informed access decisions based on an identity’s third-party risk scores. Speed…
eBook: Breaking bad actors
There’s never been a better time to deepen your skills in cybersecurity as the demand for experienced experts continues to grow. Learn how to break today’s bad actors in the eBook. Inside the eBook: Why the need for more cybersecurity…
Wipro Cyber X-Ray empowers CXOs to make optimized security investment decisions
Wipro Wipro has partnered with Zscaler to introduce Wipro Cyber X-Ray, an AI-assisted decision support platform. Wipro Cyber X-Ray empowers enterprise CXOs to make optimized security investment decisions and communicate cyber values to senior leadership and the board. Security business…
361 million account credentials leaked on Telegram: Are yours among them?
A new trove of 361 million email addresses has been added to Have I Been Pwned? (HIBP), the free online service through which users can check whether their account credentials and other data has been compromised in one or more…
Plainsea cybersecurity platform to launch at Infosecurity Europe
Plainsea is a cutting-edge platform set to shake up the cybersecurity scene with its European launch at Infosecurity Europe in 2024. As cyber threats continue to evolve at an alarming rate, the demand for efficient and intelligent cybersecurity solutions has…
Trend Micro Inline NDR enhances threat detection and response
Trend Micro announced its latest breakthrough in network detection and response (NDR) technology: Inline NDR. The technology is available via the Trend Vision One platform, where it improves detection and response across all security functions rather than operating as an…
20 free cybersecurity tools you might have missed
Free, open-source cybersecurity tools have become indispensable to protecting individuals, organizations, and critical infrastructure from cyber threats. These tools are created through collaborative and transparent efforts, making them affordable and accessible alternatives to proprietary software. Here, you will find a…
Third-party vendors pose serious cybersecurity threat to national security
In this Help Net Security video, Paul Prudhomme, Principal Security Analyst at SecurityScorecard, discusses the findings of the 2024 Redefining Resilience: Concentrated Cyber Risk in a Global Economy Research report. This research details a surge in adversaries exploiting third-party vulnerabilities…
Security challenges mount as as companies handle thousands of APIs
Modern applications are taking over enterprise portfolios, with apps classed as modern now making up 51% of the total, up by more than a quarter in the last year, according to F5. According to the 2024 edition of F5’s State…
Zyxel Networks USG LITE 60AX improves network security
Zyxel Networks launched USG LITE 60AX–an AX6000 WiFi 6 Security Router designed for small businesses, teleworkers, and managed service providers (MSPs). In today’s landscape, where these users struggle to find networking solutions that are both secure and easy to manage,…
High-risk Atlassian Confluence RCE fixed, PoC available (CVE-2024-21683)
If you’re self-hosting an Atlassian Confluence Server or Data Center installation, you should upgrade to the latest available version to fix a high-severity RCE flaw (CVE-2024-21683) for which a PoC and technical details are already public. About CVE-2024-21683 Confluence Server…
NethSecurity: Open-source Linux firewall
NethSecurity is a free, open-source Linux firewall that simplifies network security deployment. It integrates various security features into one platform, including firewalling, intrusion detection and prevention, antivirus, multi-WAN, DNS, and content filtering. NethSecurity has an intuitive interface that delivers real-time…
Businesses must prioritize digital trust to avoid major problems
As organizations pursue digital transformation, they urgently need to prioritize digital trust to achieve their goals and prepare for future market opportunities, legislation, and regulatory compliance, according to ISACA. The ISACA State of Digital Trust 2024 report finds that 77%…
Infosec products of the month: May 2024
Here’s a look at the most interesting products from the past month, featuring releases from: Abnormal Security, Adaptive Shield, Appdome, AuditBoard, Calix, Cranium, CyberArk, Cybersixgill, Dashlane, Datadog, Detectify, Eclypsium, ExtraHop, FireMon, Forcepoint, ManageEngine, OneTrust, OWASP Foundation, PlexTrac, Proofpoint, Secure Code…
Organizations are moving from experimenting with AI to adopting it
Despite AI’s potential, only 14% of organizations are ready to implement and utilize these technologies. While AI offers significant advantages, the focus must shift to essential, foundational actions to realize its full potential, emphasizing both technical and soft skills development…
Week in review: Attackers trying to access Check Point VPNs, NIST CSF 2.0 security metrics evolution
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: RansomLord: Open-source anti-ransomware exploit tool RansomLord is an open-source tool that automates the creation of PE files, which are used to exploit ransomware pre-encryption. Attackers…