The speed of cyberattacks continues to accelerate at an alarming rate, according to CrowdStrike. Adversaries increasingly exploit stolen credentials The speed of cyberattacks continues to accelerate at an alarming rate. The report indicates that the average breakout time is down…
Tag: Help Net Security
Wire fraud scams escalate in real estate deals
In this Help Net Security video, Tyler Adams, CEO at CertifID, illustrates how the real estate sector needs to invest significant effort in educating consumers and implementing protective measures to safeguard real estate transactions. Recent CertifID research found that median…
Cybersecurity fears drive a return to on-premise infrastructure from cloud computing
42% of organizations surveyed in the US are considering or already have moved at least half of their cloud-based workloads back to on-premises infrastructures, a phenomenon known as cloud repatriation, according to Citrix. The survey showed that 94% of respondents…
MSPs undergo transformation in response to persistent cyber threats
2Organizations are increasingly turning to Managed Service Providers (MSPs) to alleviate pressure on IT departments, according to SonicWall. Managed services have emerged as a game-changing solution, providing organizations with an additional human-layer of defense, addressing alert fatigue, and freeing up…
Searchlight Cyber integrates MITRE ATT&CK Mapping into DarkIQ for dark web monitoring
Searchlight Cyber has integrated the MITRE ATT&CK Enterprise Framework into its dark web monitoring solution, DarkIQ. Aligning actionable dark web intelligence with a universally understood cybersecurity framework empowers all cybersecurity teams, irrespective of size, to contextualize ongoing threats and respond…
Beyond Identity Device360 identifies device security risks
Beyond Identity released a new Device360 solution for continuous device security posture management. Device360 is the device security tool designed from day 0 to offer a simple admin experience, provide visibility into security posture of 100% of devices, and combines…
Bitsight empowers enterprises to secure the digital supply chain
Bitsight launched a fully-integrated Third-Party Risk Management solution to help enterprise risk and security leaders protect the digital supply chain. By combining Vendor Risk Management and Continuous Monitoring into a single platform, enterprise teams can assess vendor health, manage onboarding,…
Check Point introduces Quantum Force, series of AI-powered firewalls
Check Point introduces Check Point Quantum Force series: a lineup of ten firewalls designed to meet and exceed the stringent security demands of enterprise data centers, network perimeters, campuses, and businesses of all dimensions. Powered by the advanced Check Point…
VMware pushes admins to uninstall vulnerable, deprecated vSphere plugin (CVE-2024-22245, CVE-2024-22250)
VMware Enhanced Authentication Plug-in (EAP), a plugin for VMware vSphere, has two vulnerabilities (CVE-2024-22245, CVE-2024-22250) that could be exploited by attackers to mount authentication relay and session hijack attacks. The vulnerabilities haven’t been and won’t be fixed. Instead, VMware is…
Hummingbird Automations improves efficiency for compliance professionals
Hummingbird launched Automations, a new product for boosting compliance productivity, reducing risk, and lowering costs. Automations provides compliance teams at financial institutions with an easy-to-use, visual automation builder, allowing them to automate away manual, repetitive tasks, saving time and effort…
CampusGuard introduces new online training courses
CampusGuard announced latest online Security Awareness and Compliance Training packages, offering expanded choices for our valued customers. The Information Security Awareness package includes access to over 20 security awareness modules, providing users with best practices on email security, internet security,…
TruffleHog: Open-source solution for scanning secrets
TruffleHog is an open-source scanner that identifies and addresses exposed secrets throughout your entire technology stack. “TruffleHog was originally a research tool I independently authored in 2016. When I published it, no tools were scanning Git revision history for secrets.…
10 cybersecurity startups to watch in 2024
At Help Net Security, we’ve been following the cybersecurity business landscape closely for the past 25 years. Through our Industry News section, we’ve been tracking the pulse of the cybersecurity world, bringing you product news from companies worldwide. Certain vendors…
A closer look at Israeli cybersecurity funding and M&A activity in 2023
Last year was challenging for the global market, and the market downturn greatly affected even the historically resilient cybersecurity ecosystem. In this Help Net Security video, Merav Ben Avi, Content Manager at YL Ventures, talks about how the Israeli cybersecurity…
The importance of a good API security strategy
In 2024, API requests accounted for 57% of dynamic internet traffic around the globe, according to the Cloudflare 2024 API Security & Management Report, confirming that APIs are a crucial component of modern software development. But with their increased adoption…
Alleged Raccoon Infostealer operator extradited, verification site set up for victims
A Ukrainian national was extradited to the United States from the Netherlands after being indicted for crimes related to fraud, money laundering, and aggravated identity theft. According to court documents, Mark Sokolovsky conspired to operate the Raccoon Infostealer as a…
Active Directory outages can cost organizations $100,000 per day
Nearly every organization has core systems services tied to Active Directory that will go down during an outage, according to Cayosoft. Consequences of system downtime for business operations The impact of just one system being down can devastate business operations…
ManageEngine unveils ML-powered exploit triad analytics feature
ManageEngine released an ML-powered exploit triad analytics feature in its SIEM solution, Log360. Now, enterprises can knowledgeably trace the path of adversaries and mitigate breaches by providing complete contextual visibility into the exploit triad: users, entities and processes. Addressing the…
Pindrop Pulse offers protection against audio deepfakes
Pindrop launched Pindrop Pulse, an audio liveness detection capabilities for real-time identification, monitoring, and analysis of audio deepfakes. Notably, Pulse was instrumental in identifying the TTS engine used in the recent President Biden robocall attack, By leveraging advanced deep learning…
1Password acquires Kolide to improve modern workforce security
1Password announced the acquisition of Kolide, enabling businesses to meet the rising security challenges of the modern workforce that now works from anywhere and on any device. “We’ve witnessed a historic transformation of the workplace that demands transformative and intuitive…