Dynatrace announced it has extended its analytics and automation platform to provide holistic observability and security for LLMs and generative AI-powered applications. This enhancement to the Dynatrace platform enables organizations worldwide to embrace generative AI confidently and cost-effectively as part…
Tag: Help Net Security
BackBox introduces ZTNO to automate zero trust security for network operations
In a significant stride towards enhancing network security, BackBox introduces Zero Trust Network Operations (ZTNO). This offering is a best practice framework with six actionable pillars to automate cybersecurity considerations at the network layer for NetOps teams. To simplify ZTNO…
Threat actor used Vimeo, Ars Technica to serve second-stage malware
A financially motivated threat actor tracked as UNC4990 is using booby-trapped USB storage devices and malicious payloads hosted on popular websites such as Ars Technica, Vimeo, GitHub and GitLab to surreptitiously deliver malware. Another interesting detail about UNC4990 it’s mostly…
Protect AI acquires Laiyer AI to extend company’s AI/ML security capabilities
Protect AI announced it has acquired Laiyer AI. With the acquisition, Protect AI will be offering a commercial version of Laiyer AI’s open source LLM Guard with expanded features, capabilities, and integrations within the Protect AI platform. LLM Guard is…
Zero trust implementation: Plan, then execute, one step at a time
82% of cybersecurity professionals have been working on implementing zero trust last year, and 16% should be on it by the end of this year. The challenges of zero trust implementation You’ve probably heard it before: zero trust is not…
Custom rules in security tools can be a game changer for vulnerability detection
In this Help Net interview, Isaac Evans, CEO at Semgrep, discusses the balance between speed and thoroughness in CI/CD pipeline security scanning. Stressing the need to avoid slowing down the process, he recommends a nuanced approach, utilizing custom rules to…
CVEMap: Open-source tool to query, browse and search CVEs
CVEMap is an open-source command-line interface (CLI) tool that allows you to explore Common Vulnerabilities and Exposures (CVEs). It’s designed to offer a streamlined and user-friendly interface for navigating vulnerability databases. Although CVEs are crucial for pinpointing and discussing security…
Payment fraud is hitting organizations harder than ever before
96% of US companies were targeted with at least one fraud attempt in the past year, according to Trustpair. 83% of US companies saw an increase in cyber fraud attempts on their organization in the past year. Fraudsters primarily used…
Unpacking the challenges of AI cybersecurity
As organizations handle increasing amounts of data daily, AI offers advanced capabilities that would be harder to achieve with traditional methods. In this Help Net Security video, Tyler Young, CISO at BigID, explores AI’s challenges, triumphs, and future in cybersecurity.…
Infosec products of the month: January 2024
Here’s a look at the most interesting products from the past month, featuring releases from: 1Kosmos, Atakama, Critical Start, Dasera, ID R&D, Living Security, Onfido, Regula, Searchlight Cyber, Seceon, Skopenow, Skyhigh Security, SpecterOps, Veriti, and Wing Security. SpecterOps adds new…
Vade uses generative AI to enhance spear-phishing detection
Vade announced that it has pioneered a new method that improves the confidence of its spear-phishing detection engine. The enhancement, designed to combat advanced threats including those produced by generative AI, leverages threat samples created by artificial technology and human…
A zero-day vulnerability (and PoC) to blind defenses relying on Windows event logs
A zero-day vulnerability that, when triggered, could crash the Windows Event Log service on all supported (and some legacy) versions of Windows could spell trouble for enterprise defenders. Discovered by a security researcher named Florian and reported to Microsoft, the…
Experian Fraud Protect enables automotive dealers to detect and prevent fraud
With more of the vehicle buying journey shifting online and vehicle prices remaining at elevated levels, fraudsters are targeting the automotive industry at an increasing rate. To address the rising threat, Experian launched Fraud Protect, a web-based application that helps…
Kentik AI improves network monitoring and observability
Kentik launched Kentik AI to give any engineer, operator, architect, or developer the ability to troubleshoot complex networks. The company is simultaneously launching a modern and AI-assisted Network Monitoring System (Kentik NMS) to enable teams to observe, manage, and optimize…
VikingCloud THOR AI offers real-time interactive analytics
VikingCloud announced THOR AI (Threat Hunting and Orchestrated Response), a generative AI-powered cybersecurity chatbot. The new complimentary cyber defense tool is designed to assist companies of all sizes find more vulnerabilities faster – before they become disruptive threats to their…
Jetico updates BCWipe Total WipeOut to meet the NIST hard drive wipe requirements
Jetico released an update of BCWipe Total WipeOut. Addressing concerns of meeting the NIST hard drive wipe requirements, the new version of the software allows users to erase hard drive data and follow the guidelines in a single click. The…
Omada introduces real time identity governance
Omada introduced the next generation of Omada Identity Cloud, Horizons. Built on a modern, cloud-native microservice architecture, Omada will deliver speed, intelligent decision support, connectivity and higher operational efficiency. Omada Identity Cloud will deliver enhanced performance for users, with the…
Aim Security raises $10 million to unlock the full potential of GenAI technology
Aim Security announced $10 million in seed funding, led by YL Ventures, with participation from CCL (Cyber Club London), the founders of WIZ and angel investors from Google, Proofpoint and Palo Alto Networks. Aim Security was founded by cybersecurity veterans…
ProcessUnity unveils all-in-one platform for third-party risk management
ProcessUnity announced the completed integration of the Global Risk Exchange, making it the all-in-one risk platform for modernizing TPRM (Third-party risk management). Now, via a single combined offering, risk executives can positively transform their TPRM program from labor intensive, static…
Veza integrates with Google Drive to secure access to enterprise files
Veza announced an integration with Google Drive, the popular file storage and synchronization service. With this integration, Veza customers can now secure access to files like docs and spreadsheets that are stored in Google Drive. Identity is the primary avenue…