The fintech market is undergoing a rapid shift, with the rise of new technologies, such as Open Finance, generative AI and A2A (Account-to-Account) payments having a major impact on business models, according to Juniper Research. This is combined with unprecedented…
Tag: Help Net Security
Week in review: Terrapin SSH attack, Mr. Cooper breach
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Creating a formula for effective vulnerability prioritization In this Help Net Security interview, Michael Gorelik, CTO and Head of Malware Research at Morphisec, provides insights…
Base Operations raises $9.1 million to boost global threat intelligence
Base Operations announced the successful close of a $9.1 million Series A led by Grotech Ventures and Spero Ventures with notable contributions from Vela Partners, Good Growth Capital, Mindset Ventures, Alliance Holdings, and Gaingels. The company is also proud to…
New infosec products of the week: December 22, 2023
Here’s a look at the most interesting products from the past week, featuring releases from Argus Cyber Security, Cleafy, Kasada, and Stratus. Kasada launches advanced bot defense platform with evolving protection and attack insights Kasada launched its enhanced bot defense…
Future of wireless technology: Key predictions for 2024
Wi-Fi technology continues to evolve in ways that anticipate the needs of consumers, businesses, enterprise verticals, smart cities, and service providers, according to the Wireless Broadband Alliance. Tiago Rodrigues, CEO of the Wireless Broadband Alliance, revealed predictions for 2024 and…
New insights into the global industrial cybersecurity landscape
In this Help Net Security video, William Noto, VP and Industry Principal for Claroty, discusses their recent global survey of 1,100 IT and OT security professionals who work in critical infrastructure sectors. When it comes to ransomware attacks, the impact…
Tech workers fear being left unprepared for the future
While tech workers want to learn and organizations are spending thousands of dollars per employee on learning technology, it is not translating into improved on-the-job performance for 4 out of 10 IT employees, according to Skillable. Inadequate training puts workers…
11 GenAI cybersecurity surveys you should read
Generative AI stands at the forefront of technological innovation, reshaping industries and unlocking new possibilities across various domains. However, as the integration of these technologies continues, a vigilant approach to ethical considerations and regulatory compliance is essential to ensure that…
Product showcase: DCAP solution FileAuditor for data classification and access rights audit
The concept of DCAP solutions was introduced by Gartner experts, as it was clear, that without such solutions information security (IS) specialists would not be able to cope with the protection of data in various silos due to the increase…
Why data, AI, and regulations top the threat list for 2024
The new year finds us confronted by a landscape characterized by political uncertainty, social fragmentation, escalating geopolitical tensions, and a turbulent macro-economic backdrop, making it crucial for security leaders to strategically prepare for the forthcoming challenges. Let’s explore the three…
A closer look at the manufacturing threat landscape
The manufacturing industry is embracing digital transformation to fuel efficiency and productivity. However, this evolution is accompanied by profound and growing cybersecurity challenges. In this Help Net Security video, Kory Daniels, CISO at Trustwave, discusses recent comprehensive research highlighting the…
Are organizations moving away from passwords?
Passwordless authentication emerges as a calculated response, eliminating the inherent weaknesses of conventional passwords. At the heart of this evolution lies the deployment of passkeys—sophisticated cryptographic tools designed to authenticate users with a level of sophistication and reliability that transcends…
How executives adapt to rising cybersecurity concerns in mobile networks
In this Help Net Security video, Rowland Corr, VP & Head of Government Relations at Enea, discusses the implications of burner phones and the crisis of confidence in network operators as they struggle to protect consumers from sophisticated (usually state-sponsored)…
86% of cyberattacks are delivered over encrypted channels
Threats over HTTPS grew by 24% from 2022, underscoring the sophisticated nature of cybercriminal tactics that target encrypted channels, according to Zscaler. For the second year in a row, manufacturing was the industry most commonly targeted, with education and government…
Kasada launches advanced bot defense platform with evolving protection and attack insights
Kasada launched its enhanced bot defense platform with always-evolving protection, tamper-proof data collection, and augmented data-driven attack insights. Traditional bot detection systems have not kept pace with evolving automated threats. They have been rendered ineffective at defending against modern bot…
ImmuniWeb is now ISO 9001 certified
According to the International Organization for Standardization, implementation of ISO 9001 means that the certified organization has put in place effective processes and trained staff to deliver flawless products or services time after time. Today, in addition to the existing…
Stellar Cyber integrates with SentinelOne for enhanced cybersecurity across environments
Stellar Cyber unveiled its integration with SentinelOne to help organizations protect their on-premises, cloud, hybrid, and IT/OT environments by making use of the latest advancements in cybersecurity technologies. Together, Stellar Cyber and SentinelOne deliver a security operations solution that automates…
AskOmni simplifies and enhances SaaS security
AppOmni unveiled a groundbreaking advancement with the introduction of AskOmni. This AI-powered SSPM assistant developed by the AppOmni OmniScience team propels SSPM into new dimensions, simplifying security operations and issue remediation, and helping organizations secure mission-critical SaaS environments. AskOmni simplifies…
8220 gang exploits old Oracle WebLogic vulnerability to deliver infostealers, cryptominers
The 8220 gang has been leveraging an old Oracle WebLogic Server vulnerability (CVE-2020-14883) to distribute malware, the Imperva Threat Research team has found. About 8220 Active since 2017, the 8220 gang has been known for deploying cryptocurrency miners on Linux…
ConnectSecure announces improved cybersecurity scanning platform for MSPs
ConnectSecure announced it will launch the much-anticipated Version 4.0 of its flagship cybersecurity scanning platform by the end of the year. This release marks a significant leap in the technology, offering efficiency and security management for MSPs globally. Revolutionizing cybersecurity…