Tag: Help Net Security

Cognyte adds GenAI capabilities into its LUMINAR offering

Cognyte announced the release of a significant update to its LUMINAR external threat intelligence solution to incorporate GenAI capabilities, including a new AI-driven dashboard. LUMINAR is already integrated with Cognyte’s investigative analytics software and other leading solutions, and this release…

F5 appoints Samir Sherif as CISO

F5 announced the appointment of Samir Sherif as SVP and CISO. In this role, Sherif will lead F5’s enterprise cybersecurity strategy and security culture, evolve F5’s security capabilities and resilience, oversee cybersecurity standards and programs for F5’s products and services,…

Tietoevry ransomware attack halts Swedish organizations

Finnish IT software and service company Tietoevry has suffered a ransomware attack that affected several customers of one of its datacenters in Sweden. The attack The ransomware attack took place during the night of January 19-20. “The attack was limited…

New method to safeguard against mobile account takeovers

Computer science researchers have developed a new way to identify security weaknesses that leave people vulnerable to account takeover attacks, where an attacker gains unauthorized access to online accounts. Most mobiles are now home to a complex ecosystem of interconnected…

Bad bot traffic skyrockets across the web

Bad bots are automated programs designed with malicious intent to perform various activities on the internet, often causing harm to individuals, organizations, and online ecosystems. What makes them particularly dangerous is their ability to mimic the actions of legitimate users…

Global cyber inequity skyrockets

There has been a sharp increase in cyber inequity globally, with 90% of executives warning that urgent action is needed to address it, according to the World Economic Forum. While increased geopolitical tensions and economic instability continue to concern industry…

CloudFoxable: Open-source AWS penetration testing playground

CloudFoxable is a capture-the-flag (CTF) style learning platform you can deploy to your playground AWS account. It primarily targets current penetration testers seeking to learn exploitation of cloud-native attack paths, and cloud security experts aiming to practice offensive security techniques…

The reality of hacking threats in connected car systems

With the integration of sophisticated technologies like over-the-air updates and increased data connectivity, cars are no longer just modes of transportation but also hubs of personal and operational data. This shift brings forth unique cybersecurity challenges, ranging from hacking and…

Out with the old and in with the improved: MFA needs a revamp

From AI to ZTA (zero-trust architecture), the technology responsible for protecting your company’s data has evolved immensely. Despite the advances, cybercriminals repeatedly find new and creative ways to gain access to sensitive information. This can result in devastating consequences, making…

New infosec products of the week: January 19, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Living Security, Skopenow, Skyhigh Security, and Wing Security. Skyhigh Security’s AI-driven DLP Assistant prevents critical data loss Skyhigh Security’s AI-driven DLP Assistant, which supports queries…

Digital nomads amplify identity fraud risks

The number of foreign document verification cases in all parts of the world has grown by an average of 21% since the summer of 2021, according to Regula. It’s even higher in the US and UAE: these countries are experiencing…

Vercara UltraSecure offers protection from malicious attacks

Vercara is introducing UltraSecure bundles designed to meet the online security needs of mid-size companies. These flexible packages offer enterprise-grade, custom solutions that protect critical applications, secure online properties and increase web performance. While mid-size companies and SMBs have the…