Egress has launched a highly accurate graymail solution, with full end-user control, dedicated to improving employee productivity and reducing the time administrators spend reviewing incorrectly reported phishing emails. The graymail feature is architected into Egress’ inbound threat detection product, Egress…
Tag: Help Net Security
ThreatNG empowers organizations to identify and mitigate their ransomware risk
ThreatNG Security launched its new Ransomware Susceptibility Assessment, Reporting, and Monitoring Solution. The new solution helps organizations assess their ransomware susceptibility externally and monitor their networks for potential threats. According to the FBI, ransomware attacks increased by 13% in 2022,…
Nitrokey releases NetHSM, a fully open-source hardware security module
German company Nitrokey has released NetHSM 1.0, an open-source hardware security module (HSM). Nitrokey NetHSM 1.0 features The module can be used for storing and managing a variety of cryptographic keys (e.g., keys to enable HTTPS, DNSSEC, secure blockchain transactions,…
SAS collaborates with AWS to help customers unlock more value from their data
SAS has signed a strategic collaboration agreement (SCA) with AWS with plans to help customers extract maximum value and performance from their data in the cloud. SAS now offers SAS Customer Intelligence 360, a highly intelligent customer experience solution, in…
What custom GPTs mean for the future of phishing
OpenAI is putting more power into the hands of users of GenAI, allowing them to create their custom AI agents without writing code. These custom GPTs are the latest leap forward in the rapidly evolving AI landscape, but this highly…
Mosint: Open-source automated email OSINT tool
Mosint is an automated email OSINT tool written in Go designed to facilitate quick and efficient investigations of target emails. It integrates multiple services, providing security researchers with rapid access to a broad range of information. “In my previous job,…
Bridging the risk exposure gap with strategies for internal auditors
In this Help Net Security interview, Richard Chambers, Senior Internal Audit Advisor at AuditBoard, discusses the transformational role of the internal audit function and risk management in helping organizations bridge the gap in risk exposure. He talks about how a…
Infosec products of the month: November 2023
Here’s a look at the most interesting products from the past month, featuring releases from: Action1, Amazon, Aqua Security, ARMO, Datadog, Devo Technology, Druva, Entrust, Enzoic, Fortanix, GitHub, Illumio, Immuta, IRONSCALES, Kasada, Lacework, Malwarebytes, OneSpan, Paladin Cloud, Snappt, ThreatModeler, and…
Organizations can’t ignore the surge in malicious web links
Despite the rising adoption of collaboration and instant messaging software, email remains a significant area of concern regarding cyber attacks, particularly the increasing threat of cybercriminals employing harmful web links in emails, according to Hornetsecurity. Attack techniques used in email…
ManageEngine introduces a dual-layered threat detection system in its SIEM solution, Log360
ManageEngine has unveiled the dual-layered threat detection system in its security information and event management (SIEM) solution, Log360. The new feature, available in Log360’s threat detection, investigation and response (TDIR) component, Vigil IQ, empowers security operations center (SOC) teams in…
1Kosmos enables identity proofing from the web, without downloading a mobile app
1Kosmos announced the 1Kosmos BlockID platform now enables organizations to seamlessly extend web-based identity proofing sessions to a user’s mobile device for scanning government issued documents. This new capability does not require a mobile application, and creates a frictionless web…
FileCloud and Votiro join forces to protect customers from file-borne threats
FileCloud announced a partnership with Votiro to provide customers with options to enhance their security posture. FileCloud is used by leading government and private sector organizations worldwide for secure, compliant file sharing and content collaboration. This partnership shows FileCloud’s commitment…
PoCs for critical Arcserve UDP vulnerabilities released
Arcserve has fixed critical security vulnerabilities (CVE-2023-41998, CVE-2023-41999, CVE-2023-42000) in its Unified Data Protection (UDP) solution, PoCs for which have been published by Tenable researchers on Monday. The vulnerabilities Arcserve UDP is a popular enterprise data protection, backup and disaster…
BlueVoyant acquires Conquest Cyber to help clients mitigate risks while meeting new requirements
BlueVoyant announced the acquisition of Conquest Cyber, a cyber defense company renowned for its innovative SaaS technology that streamlines risk management across an organization’s entire cyber program. Conquest Cyber has proven successful within high-security environments, including the U.S. Defense Industrial…
GuidePoint Security announces Compliance Management as a Service
GuidePoint Security launched Compliance Management as a Service, which will help organizations stay on top of required activities and maintain the necessary data to support future compliance assessments. “While organizations may work intensely to meet certain compliance standards, they are…
Business metrics for Cisco Cloud Observability capability enables customers to protect revenue
Cisco announced new business metrics in Cisco Cloud Observability. Powered by the Cisco Observability Platform to enhance business context for modern applications running on AWS. This latest release also supports integration with AWS services and application performance monitoring (APM) correlation…
Google fixes Chrome zero day exploited in the wild (CVE-2023-6345)
Google has released an urgent security update to fix a number of vulnerabilities in Chrome browser, including a zero-day vulnerability (CVE-2023-6345) that is being actively exploited in the wild. About CVE-2023-6345 CVE-2023-6345, reported by Benoît Sevens and Clément Lecigne of…
Okta breach: Hackers stole info on ALL customer support users
The scope of the recent breach of the Okta customer support system is much wider than initially established, the company has admitted on Tuesday: the attackers downloaded a report that contained the names and email addresses of all Okta customer…
SentinelOne and Pax8 expand partnership to enhance security measures for SMBs
For more than four years, SentinelOne and Pax8 have been teaming to provide SMBs with next-generation cybersecurity solutions that enable them to protect their most critical infrastructure and assets from end to end. The strategic partners announced a significant expansion…
Tails 5.2.0 comes with several improvements, updated Tor Browser
Tails is a portable operating system that protects against surveillance and censorship. Tails can be installed on any USB stick with a minimum of 8 GB. Tails works on most computers under ten years old. You can start again on…