In January 2024, an operation dismantled a network of hundreds of SOHO routers controlled by GRU Military Unit 26165, also known as APT 28, Sofacy Group, Forest Blizzard, Pawn Storm, Fancy Bear, and Sednit. This network facilitated various crimes, including…
Tag: Help Net Security
Cyberint Ransomania empowers organizations to proactively defend against ransomware attacks
Cyberint is unveiling its latest contribution to the infosec community: Ransomania. This free-to-use web application gives users access to a complete repository of ransomware data gathered by the Cyberint Research Team, empowering organizations to combat ransomware with efficiency and collaboration,…
Permit.io raises $8 million to simplify app development
Permit.io announced it has raised $8 million in Series A funding, led by Scale Venture Partners, along with NFX, Verissimo Ventures, Roosh Ventures, Firestreak, 92712, and other existing investors, to ensure application developers never have to build permissions again. Scale…
Gmail & Yahoo DMARC rollout: When cyber compliance gives a competitive edge
The essence of cybersecurity is not just about defense but enabling business through trust and reliability. As Gmail and Yahoo take steps to enforce stricter email authentication, organizations that are proactive in their DMARC compliance will not only enhance their…
New infosec products of the week: February 16, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Appdome, Center for Internet Security, Cyberhaven, LOKKER, Sumsub, and CompliancePro Solutions. CIS ESS Mobile offers visibility into blind spots on mobile devices CIS ESS Mobile…
Cybersecurity sectors adjust as DDoS attacks reach new heights
In this Help Net Security video, Andrey Slastenov, Head of Security Department at Gcore, discusses the findings of their latest report that provide insights into the current state of the DDoS protection market and cybersecurity trends. Key highlights from Q3–Q4…
Physical security is becoming a top priority in building design
Despite the importance of security, it was, until recently, an afterthought in building design, according to Brivo. Rather than considering security from the very beginning, it was addressed later. This meant costly retrofit efforts such as installing cameras to cover…
Cyber threats cast shadow over 2024 elections
Considering that 2024 is a historic year for elections – with an estimated half of the world’s population taking part in democratic votes – this high threat of cyber interference has significant implications for global free society, threatening to undermine…
BigID unveils access intelligence capabilities for security, risk, and AI compliance
BigID announced new access governance controls that enable organizations to easily improve security posture, mitigate insider risk, achieve zero trust security, and accelerate AI compliance. BigID is pioneering access governance and controls for analytics and AI data, across the cloud…
Mitek MiControl empowers financial institutions to detect check fraud
Mitek introduced MiControl, a comprehensive fraud management console that works with Mitek’s Check Fraud Defender. MiControl detects check fraud, reduces losses and further increases consumers’ online security. With its advanced visualizations and overlays, paired with business rules configured by the…
NICE Actimize introduces generative AI-based solutions designed to fight financial crime
NICE Actimize announces three advanced generative AI-based solutions designed to fight financial crime and allow organizations to significantly reduce the manual and labor-intensive tasks currently employed in financial crime investigations and reporting. Offering up to a 50% reduction in investigation…
Infoblox SOC Insights reduces critical security operations challenges
Infoblox announced an AI-driven security operations solution, SOC Insights, that boosts its DNS Detection and Response solution, BloxOne Threat Defense. SOC Insights empowers security analysts to jump-start investigations that truly matter and dramatically reduce response time by turning vast amounts…
Bitwarden adds event logs and self-hosting capabilities to its Passwordless.dev toolkit
Bitwarden strengthened its Passwordless.dev enterprise plan with event logs and self-hosting options. These features empower organizations with greater transparency when moving to passwordless authentication and enable developers to build workforce passkey authentication with ease. High demand for enterprise passkey authentication…
Battery maker Varta halts production after cyberattack
German battery manufacturer Varta was forced to shut down its IT systems and stop production as a result of a cyberattack. The Varta cyberattack The cyberattack occurred on Monday night and affected five of the company’s production plants and the…
CPS Insights helps organizations analyze and visualize their healthcare privacy data
CompliancePro Solutions launched their new analytics product, CPS Insights. As a new add-on module to the CompliancePro Privacy Program Management platform, CPS Insights is a vital analytics and visualization tool for operational reporting needs. CPS Insights helps organizations efficiently analyze…
iOS users beware: GoldPickaxe trojan steals your facial data
Group-IB uncovered a new iOS trojan designed to steal users’ facial recognition data, identity documents, and intercept SMS. The trojan, dubbed GoldPickaxe.iOS by Group-IB’s Threat Intelligence unit, has been attributed to a Chinese-speaking threat actor codenamed GoldFactory, responsible for developing…
AI outsourcing: A strategic guide to managing third-party risks
In an era of artificial intelligence (AI) revolutionizing business practices, many companies are turning to third-party AI services for a competitive edge. However, this approach comes with its own set of risks. From data security concerns to operational disruptions, understanding…
Collaboration at the core: The interconnectivity of ITOps and security
In this Help Net Security video, Krista Macomber, Research Director at The Futurum Group, discusses how IT and security teams increasingly unite against cyber threats. Organizations are still struggling with the issue of disjointed data protection solutions, leading to not…
5 free digital forensics tools to boost your investigations
Digital forensics plays a crucial role in analyzing and addressing cyberattacks, and it’s a key component of incident response. Additionally, digital forensics provides vital information for auditors, legal teams, and law enforcement agencies in the aftermath of an attack. Many…
Understanding the tactics of stealthy hunter-killer malware
Picus Security has revealed a rise in hunter-killer malware, highlighting a significant shift in adversaries’ capability to pinpoint and thwart advanced enterprise defenses, including next-gen firewalls, antivirus programs, and EDR systems. There was a 333% increase in malware that can…