Bitdefender launched Email Protection, a new feature that scans and identifies potentially dangerous content such as phishing attempts and online scams, in webmail accessed from any device. Email Protection allows users to extend one of the world’s best endpoint protection…
Tag: Help Net Security
SailPoint unveils two sets of new offerings to help companies grow their identity security program
SailPoint unveiled two sets of new offerings designed to give customers options as they build their identity program, while driving customer success throughout their identity journey. First, the company is extending the family of SailPoint Identity Security Cloud offerings with…
Cisco Motific reduces GenAI security, trust, and compliance risks
Cisco announced Motific, Cisco’s SaaS product that allows for trustworthy GenAI deployments in organizations. Born from Outshift, Cisco’s incubation business, Motific provides a central view across the entire GenAI journey, empowering central IT and security teams to rapidly deliver trustworthy…
Spoutible API exposed encrypted password reset tokens, 2FA secrets of users
A publicly exposed API of social media platform Spoutible may have allowed threat actors to scrape information that can be used to hijack user accounts. The problem with the Spoutible API Security consultant Troy Hunt has been tipped off about…
Delinea appoints Kate Reed as CMO
Delinea announced that Kate Reed has joined the company as Chief Marketing Officer (CMO). With more than two decades of experience in technology and cybersecurity, Reed assumes leadership of all marketing functions and initiatives and will play a pivotal role…
OpenText Fortify Audit Assistant increases developer efficiency by reducing noise and false positives
OpenText announced the second generation of its advanced cybersecurity auditing technology. Today’s developers are dealing with more complexity and threats in multi-cloud environments. Security teams feel increasing pressure to tackle application security with more sophisticated tools and practices. Fortify Audit…
Akamai Content Protector detects and mitigates evasive scrapers
Akamai announced Content Protector, a product that stops scraping attacks without blocking the good traffic that companies need to enhance their business. Scraper bots are a critical and often productive part of the commerce ecosystem. These bots search for new…
NinjaOne raises $231.5 million to boost product innovation
NinjaOne announced it raised a $231.5 million Series C funding round led by ICONIQ Growth. Frank Slootman, Chairman and CEO of Snowflake; and Amit Agarwal, President of Datadog; among others also invested in the round. With this financing, ICONIQ Growth…
ResumeLooters target job search sites in extensive data heist
Group-IB identified a large-scale malicious campaign primarily targeting job search and retail websites of companies in the Asia-Pacific region. The group, dubbed ResumeLooters, successfully infected at least 65 websites between November and December 2023 through SQL injection and XSS attacks.…
IBM LinuxONE 4 Express protects sensitive private data
IBM announced IBM LinuxONE 4 Express, extending the latest performance, security and AI capabilities of LinuxONE to small and medium sized businesses and within new data center environments. The pre-configured rack mount system is designed to offer cost savings and…
Cisco introduces new integrations across networking and security portfolios
Cisco introduced new capabilities and technologies across its networking portfolio that are designed to drive a more unified and integrated approach to managing and securing customer networks. IT organizations are looking to their technology providers to help address three core…
Lagging Mastodon admins urged to patch critical account takeover flaw (CVE-2024-23832)
Five days after Mastodon developers pushed out fixes for a remotely exploitable account takeover vulnerability (CVE-2024-23832), over 66% of Mastodon servers out there have been upgraded to close the hole. About Mastodon Mastodon is open-source (server) software for running self-hosted…
3 ways to achieve crypto agility in a post-quantum world
Working at the speed of digital business is a constant challenge. But in today’s increasingly automated operational environment, crypto agility—i.e., an organization’s ability to (at the moment of compromise) switch rapidly and seamlessly between certificate authorities, encryption standards and keys…
How CISOs navigate policies and access across enterprises
In this Help Net Security interview, Marco Eggerling, Global CISO at Check Point, discusses the challenge of balancing data protection with diverse policies, devices, and access controls in a distributed enterprise. He also highlights the significance of security validations, especially…
10 must-read cybersecurity books for 2024
Our list of cybersecurity books has been curated to steer your professional growth in 2024. This selection aims to provide comprehensive information security insights and knowledge, ensuring you stay ahead in your career learning journey throughout the year. Cyber for…
Exploring NIST Cybersecurity Framework 2.0
In this Help Net Security video, Dan Erel, VP of Security at SeeMetrics, discusses NIST Cybersecurity Framework (CSF) 2.0. NIST CSF is based on existing standards, guidelines, and practices for organizations to manage and reduce cybersecurity risk better. It was…
Paying ransoms is becoming a cost of doing business for many
Today’s pervasive cyberattacks are forcing the majority of companies to pay ransoms and break their ‘do not pay’ policies, with data recovery deficiencies compounding the problem, according to Cohesity. In fact, most companies have paid a ransom in the last…
Varonis MDDR helps organizations prevent data breaches
Varonis introduced Varonis Managed Data Detection and Response (MDDR), a managed service dedicated to stopping threats at the data level. Unlike traditional MDR services that are endpoint- and network-centric, MDDR focuses on threats to data. The offering combines Varonis’ award-winning…
Deepfaked video conference call makes employee send $25 million to scammers
A deepfake video conference call paired with social engineering tricks has led to the theft of over US$25 million from a multinational firm, the South China Morning Post has reported. The scheme and the deepfake video conference call The attack…
Metomic for ChatGPT identifies critical risks in ChatGPT conversations
Metomic launched Metomic for ChatGPT, a technology that gives IT and security leaders full visibility into what sensitive data is being uploaded to OpenAI’s ChatGPT platform. The easy-to-use browser plugin enables businesses to take full advantage of the generative AI…