Cloudflare announced the development of Firewall for AI, a new layer of protection that will identify abuse and attacks before they reach and tamper with Large Language Models (LLMs), a type of AI application that interprets human language and other…
Tag: Help Net Security
Axonius secures $200 million to scale its global reach and product innovation
Axonius announced it has secured $200 million in a Series E extension funding round led by Accel and Lightspeed Venture Partners. Stripes also participated. This new round of funding is intended to accelerate innovation and scale across the globe as…
Bitdefender releases GravityZone Cloud MSP Security Solutions
Bitdefender launched GravityZone Cloud MSP Security Solutions, a new offering designed specifically for managed service providers (MSPs) and their business customers that delivers endpoint protection and managed detection and response (MDR) services to detect and eradicate cyberthreats as they occur…
NetApp cyber-resiliency capabilities protect both primary and secondary data
NetApp announced cyber-resiliency capabilities that will equip customers to better protect and recover their data in the face of ransomware threats. NetApp integrates artificial intelligence (AI) and machine learning (ML) directly into enterprise primary storage to fight ransomware in real-time.…
Delinea Privilege Control for Servers enforces least privilege principles on critical systems
Delinea announced the introduction of Privilege Control for Servers on the Delinea Platform, enforcing least privilege principles on critical systems consistently across identities to combat stolen credentials and restrict lateral movement. The Delinea Platform combines enterprise vaulting, VPN-less privileged remote…
Okta FGA enables developers to define authorization in a way that best fits their business
Okta announced Fine Grained Authorization (FGA) to address authorization complexities for developers. FGA allows developers to design authorization models in a way that’s centralized, flexible, scalable, and easy to use. With FGA, development teams can spend less time building and…
Hundreds of orgs targeted with emails aimed at stealing NTLM authentication hashes
A threat actor specializing in establishing initial access to target organizations’ computer systems and networks is using booby-trapped email attachments to steal employees’ NTLM hashes. Why are they after NTLM hashes? NT LAN Manager (NTLM) hashes contain users’ (encoded) passwords.…
Why cyber maturity assessment should become standard practice
Understanding risk is one thing, but how do you know if your organization has what it takes to withstand those risks being realized? Establishing cyber maturity can help determine resilience, where the strengths and weaknesses lie, and what needs to…
Secure your hybrid workforce: The advantages of encrypted storage
In this Help Net Security video, Ryan Amparo, Field Application Engineer at Kingston Technology, discusses the benefits of encrypted external SSDs and USBs for hybrid workforces. He talks about the differences between software and hardware encryption, why it’s important, and…
3 free data protection regulation courses you can take right now
Increasingly, information about us, and even by us, is being processed. Even mundane or insignificant details can be combined and linked with other data in a manner that may intrude upon or pose a risk to our privacy. Data protection…
Organizations are knowingly releasing vulnerable applications
92% of companies had experienced a breach in the prior year due to vulnerabilities of applications developed in-house, according to Checkmarx. AppSec managers and developers share application security duties In recent years the responsibility for application security has shifted away…
What organizations need to know about the Digital Operational Resilience Act (DORA)
In this Help Net Security interview, Kris Lovejoy, Global Security and Resilience Leader at Kyndryl, discusses the impact of the Digital Operational Resilience Act (DORA) on organizations across the EU, particularly in ICT risk management and cybersecurity. With a focus…
Critical vulnerabilities in TeamCity JetBrains fixed, release of technical details imminent, patch quickly! (CVE-2024-27198, CVE-2024-27199)
JetBrains has fixed two critical security vulnerabilities (CVE-2024-27198, CVE-2024-27199) affecting TeamCity On-Premises and is urging customers to patch them immediately. “Rapid7 originally identified and reported these vulnerabilities to us and has chosen to adhere strictly to its own vulnerability disclosure…
Cloudflare Defensive AI protects organizations against AI-enhanced attacks
Cloudflare announced Defensive AI, a personalized approach to securing organizations against the new wave of risks presented by emerging technology. Threat actors have begun to successfully test the limits of AI-enhanced attacks, using the power of AI to launch sophisticated…
Cyolo PRO simplifies remote privileged access in OT environments
Cyolo launched Cyolo PRO (Privileged Remote Operations), a hybrid secure remote access solution for Operational Technology (OT). Developed specifically to enable safe operations of privileged users, Cyolo PRO is an advanced solution set to redefine Secure Remote Access (SRA) by…
GitHub push protection now on by default for public repositories
GitHub push protection – a security feature aimed at preventing secrets such as API keys or tokens getting accidentally leaked online – is being switched on by default for all public repositories. “This means that when a supported secret is…
Darktrace partners with Xage Security to detect threats deep inside IT and OT systems
Darktrace and Xage Security announced a new partnership to help businesses prevent cyberattacks and insider threats in critical environments. This collaboration brings together Xage Security’s zero trust protection with Darktrace’s AI-powered anomaly-based threat detection. The integration between Darktrace/OT and Xage…
Identiv ScrambleFactor provides privacy and security in restricted access environments
Identiv introduces ScrambleFactor, an addition to its high-security physical access control system (PACS) portfolio. The ScrambleFactor reader reimagines secure entry for the federal market with fingerprint biometrics and a LCD touchscreen keypad, integrating multiple authentication methods to deliver unparalleled security,…
Akamai App & API Protector enhancements detect and mitigate short DDoS attack bursts
Akamai announced significant additions to its flagship Akamai App & API Protector product, including advanced defenses against sophisticated application-layer distributed denial-of-service (DDoS) attacks. The enhanced Layer 7 DDoS protections now precisely detect and mitigate short DDoS attack bursts and use…
Zyxel Networks introduces affordable WiFi 7 solution for SMBs
Zyxel Networks has released its NWA130BE – BE11000 WiFi 7 Triple-Radio NebulaFlex Access Point (AP). With WiFi 7-supported devices ready to go mainstream in 2024, the NWA130BE enables small to medium-sized businesses (SMBs) to benefit from network speed, capacity and…