Tag: Help Net Security

LimaCharlie SecOps Cloud Platform eliminates integration challenges

LimaCharlie is unveiling the Security Operations (SecOps) Cloud Platform, a vendor-neutral architecture built for security teams to develop the most effective infrastructure for their organization. The LimaCharlie SecOps Cloud Platform provides comprehensive enterprise protection by bringing together critical cybersecurity capabilities,…

CompTIA DataSys+ program provides resources for database management skills

CompTIA released the CompTIA DataSys+ program, a comprehensive set of resources for learning and skills validation for IT professionals in search of database management skills. The CompTIA DataSys+ program covers all aspects of database administration, including deployment, management, and maintenance…

Cybersecurity measures SMBs should implement

Small and medium-sized businesses (SMBs) are targeted by cyberattackers as much as large companies, the 2023 Verizon Data Breach Investigations Report (DBIR) has revealed; here are some cybersecurity controls they should prioritize. Company size does not matter to cyber attackers…

What to do (and what not to do) after a data breach

Data breaches have been hitting the headlines left and right. Every time a breach occurs, the impacted organization’s response differs from the last. In this Help Net Security video, Rodman Ramezanian, Global Cloud Threat Lead at Skyhigh Security, discusses what…

Trends in ransomware-as-a-service and cryptocurrency to monitor

In January, law enforcement officials disrupted the operations of the Hive cybercriminal group, which profited off a ransomware-as-a-service (RaaS) business model. Hive is widely believed to be affiliated with the Conti ransomware group, joining a list of other groups associated…

Bureau raises $16.5 million to help users prevent fraud

Bureau is announcing an additional $4.5m from GMO VenturePartners, GMO Payment Gateway, and existing investors to complete its series A funding round at $16.5m. With the completion of the latest round, total funding for the startup has reached $20.5m to…

eBook: 9 Ways to Secure Your Cloud App Dev Pipeline

Improve your cloud security with these 9 proven strategies. Uptycs, alongside renowned expert Lee Atchison, share their list of comprehensive tactics to mitigate risks facing modern development teams. To address these emerging risks, Uptycs has created an eBook, Laptop to…

Supply chain executives unaware of growing customer trust issues

Supply chain executives significantly overestimate stakeholder trust in their supply chain capabilities and intentions, according to Deloitte. Of more than 1,000 executives from large global organizations surveyed, 89% on average who self-identified as leading suppliers said customers trust their supply…

Splunk Edge Hub provides visibility across IT and OT environments

Splunk announced Splunk Edge Hub, a new solution that simplifies the ingestion and analysis of data generated by sensors, IoT devices and industrial equipment. Splunk Edge Hub provides more complete visibility across IT and OT environments by streaming previously hard…

VirusTotal leaked data of 5,600 registered users

VirusTotal has suffered a data leak that exposed the names and email addresses of 5,600 of its registered users. The leaked data reportedly includes information about employees of US and German intelligence agencies (among others). VirusTotal data leak exposed exploitable…

Pat Clawson joins CheckRed Security as CEO

CheckRed Security announced that the company’s Board of Directors has appointed Pat Clawson as its first CEO. Clawson brings more than 20 years of leadership experience in driving cybersecurity innovation. As CEO, Clawson will lead CheckRed’s global initiatives to secure…

Splunk partners with Microsoft to strengthen digital resilience

Splunk and Microsoft are partnering to build Splunk’s enterprise security and observability offerings on Microsoft Azure. Additionally, for the first time, Splunk solutions will be available for purchase on the Microsoft Azure Marketplace. “Splunk and Microsoft’s strategic partnership will provide…

Data compromises on track to set a new record

The number of data compromises reported in the U.S. in the H1 of 2023 is higher than the total compromises reported every year between 2005 and 2020, except for 2017, according to Identity Theft Resource Center. For the H1 ending…

Healthcare organizations in the crosshairs of cyberattackers

In an era where cyber threats continue to evolve, healthcare organizations are increasingly targeted by malicious actors employing multiple attack vectors, according to Trustwave. In its new research, Trustwave SpiderLabs has documented the attack flow utilized by threat groups, shedding…

Broadband consumers demand security and sustainability

Consumer expectations will reshape the needs and economics of the internet, according to Cisco. People in EMEA are rethinking what they rely on the internet for, balancing classic demands for speed and reliability, with the intensifying needs of rising eco-consciousness,…

Critical XSS vulnerability in Zimbra exploited in the wild (CVE-2023-34192)

A critical cross site scripting (XSS) vulnerability (CVE-2023-34192) in popular open source email collaboration suite Zimbra is being exploited by attackers. About the vulnerability (CVE-2023-34192) CVE-2023-34192 could allow a remote authenticated threat actor to execute arbitrary code through a crafted…

Building resilience through DevSecOps

DevSecOps, short for Development, Security, and Operations, is an approach that emphasizes the integration of security practices and principles into every stage of the software development lifecycle. It aims to bridge the gap between development teams, security teams, and operations…

Real-world examples of quantum-based attacks

Quantum computing is poised to revolutionize the way we secure and privatize data. It can potentially disrupt our existing encryption methods, endangering sensitive data from various sources in ways even beyond what we’ve experienced with AI. In this Help Net…

Growing scam activity linked to social media and automation

The average number of scam resources created per brand across all regions and industries more than doubled year-on-year in 2022, up 162%, according to Group-IB. Additionally, the total number of scam pages detected by Group-IB in 2022 was more than…

BlueVoyant MXDR for Splunk empowers users to identify security threats

BlueVoyant announced MXDR for Splunk, enabling clients to maximize their security investment, expedite implementation, and streamline threat detection. The new service integrates Splunk SIEM (Security Information and Event Management) capabilities with supported EDR partner expertise to provide a cloud-native, fully…

Teleskope launches AI-based data protection platform

Teleskope has launched a data protection platform that automates data security, privacy, and compliance at scale, helping organizations comply with regulations like GDPR and CCPA, and reduce the manual and operation burden on security, data, and engineering teams. The company…

Meta’s Threads app used as a lure

It was to be expected: As the buzz around Meta’s new microblogging platform Threads gained momentum, some individuals have stepped in to take advantage of the fact that the app still can’t formally serve users in the European Union (or…

Generative AI outperforms hackers but not their creativity

72% of hackers are confident that AI cannot replace human creativity in security research and vulnerability management, according to Bugcrowd. Generative AI hacking Generative AI was a major theme in the 2023 report, with 55% of respondents saying that it…

Facebook and Microsoft remain prime targets for spoofing

While trends in phishing frequently evolve, Facebook and Microsoft’s collective dominance as the most spoofed brands continues, according to Vade. Facebook and Microsoft’s collective dominance as the most spoofed brands continued into H1 2023, with the former accounting for 18%…

New infosec products of the week: July 14, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Fidelis Cybersecurity, Hubble, NETSCOUT, Regula, and WatchGuard. WatchGuard expands identity protection capabilities with AuthPoint Total Identity Security AuthPoint Total Identity Security enables MSPs to offer…

Top priorities for chief audit executives in 2023

The top focus areas for chief audit executives (CAEs) in 2023 are advancing data analytics, assuring proliferating digital risks, and talent management, according to Gartner. “In 2023 most CAEs are focusing on organizational and departmental digital transformation initiatives and improving…

Blue Team Con announces Lesley Carhart as keynote speaker

Blue Team Con has announced that Lesley Carhart will deliver the keynote address titled “We’re All Scared, Too: 10 Years of Lessons from Cybersecurity Mentorship” at the conference. “We are thrilled to have Lesley as our keynote speaker this year,”…

AU10TIX app automates identity and age verification for businesses

AU10TIX launched the AU10TIX app, empowering customer-facing businesses with automated, in-person and point of sale (POS) identity and age verification capabilities. The app enables companies to securely verify IDs in the field within 4-8 seconds, enhancing the customer experience and…

Truework Guardian improves employee data security

Truework launched Truework Guardian, a new verification automation tool for employees, employers and payroll providers that replaces the manual HR verification process while increasing the protection of sensitive data. Guardian is a solution to help payroll providers and Human Capital…

ManageEngine adds OpenAI observability to Site24x7

ManageEngine has added OpenAI observability as a native capability to Site24x7, its comprehensive cloud-based observability platform. The offering enables application owners to monitor the utilization of different OpenAI models seamlessly while tracking real-time performance and cost metrics — all within…

White House publishes National Cybersecurity Strategy Implementation Plan

The Biden-Harris Administration’s recently released National Cybersecurity Strategy calls for two fundamental shifts in how the United States allocates roles, responsibilities, and resources in cyberspace: Ensuring that the biggest, most capable, and best-positioned entities – in the public and private…

Unnamed APT eyes vulnerabilities in Rockwell Automation industrial contollers (CVE-2023-3595 CVE-2023-3596)

Rockwell Automation has fixed two vulnerabilities (CVE-2023-3595, CVE-2023-3596) in the communication modules of its ControlLogix industrial programmable logic controllers (PLCs), ahead of expected (and likely) in-the-wild exploitation. “An unreleased exploit capability leveraging these vulnerabilities is associated with an unnamed APT…

Fidelis Active Directory Intercept enables identification of AD issues

Fidelis Cybersecurity released the new Fidelis Active Directory Intercept, a capability that combines network detection and response, deception technology, and Active Directory (AD) security, as part of their Fidelis Network and Deception 9.6.1 product release. Active Directory Intercept is the…

Attack Surface Management: Identify and protect the unknown

In this Help Net Security video, Brianna McGovern, Product Manager, Attack Surface Management, NetSPI, discusses Attack Surface Management (ASM). Attack Surface Management detects known, unknown, and potentially vulnerable public-facing assets and changes to your attack surface that may introduce risk.…

Combatting data governance risks of public generative AI tools

When companies utilize public generative AI tools, the models are refined on input data provided by the company. Regarding data security, unauthorized use of sensitive data or the accidental exposure of proprietary information can lead to reputational damage, legal consequences,…

Infrastructure upgrades alone won’t guarantee strong security

While 75% of organizations have made significant strides to upgrade their infrastructure in the past year, including the adoption of public cloud hosting and containerization, and 78% have increased their security budgets, only 2% of industry experts are confident in…

20% of malware attacks bypass antivirus protection

Security leaders are concerned about attacks that leverage malware-exfiltrated authentication data, with 53% expressing extreme concern and less than 1% admitting they weren’t concerned at all, according to SpyCloud. However, many still lack the necessary tools to investigate the security…

Only 45% of cloud data is currently encrypted

39% of businesses have experienced a data breach in their cloud environment last year, an increase on the 35% reported in 2022, according to Thales. In addition, human error was reported as the leading cause of cloud data breaches by…

(ISC)² expands its diversity, equity and inclusion (DEI) partner network

(ISC)² expanded its diversity, equity, and inclusion (DEI) partner network, cementing its commitment to fostering greater diversity within the cybersecurity field. Following the initial announcement of five founding partners, an additional eight organizations have joined forces with (ISC)², demonstrating a…

anecdotes Analysis Engine helps users detect gaps in their data

anecdotes launched Analysis Engine, empowering its customers to attain proactive GRC monitoring. With the introduction of the new engine, users gain access to robust analysis capabilities that automatically detect gaps in their data and provide deep visibility into their Compliance…

CyberCatch collaborates with Proficioto to protect users against cyber threats

CyberCatch and Proficio announced a strategic partnership to join forces to market and deliver a combined AI-enabled solution for organizations worldwide. CyberCatch’s proprietary, artificial intelligence-enabled (AI) Software-as-a-Service (SaaS) solution is designed to help organizations implement all mandated and necessary controls,…

Wipro announces Wipro ai360 and the $1 billion investment in AI

Wipro launched Wipro ai360, a comprehensive, AI-first innovation ecosystem that builds on Wipro’s decade-long investments in AI with the goal of integrating AI into every platform, every tool, and every solution used internally and offered to clients. Along with the…

Same code, different ransomware? Leaks kick-start myriad of new variants

Threat landscape trends demonstrate the impressive flexibility of cybercriminals as they continually seek out fresh methods of attack, including exploiting vulnerabilities, gaining unauthorized access, compromising sensitive information, and defrauding individuals, according to the H1 2023 ESET Threat Report. Microsoft: An…

IDrive introduces Google Shared Drive backup

IDrive Backup announced the introduction of Google Shared Drive backup, which automatically detects and backs up all the shared drives available to the Super Administrator of the Google Workspace account. Shared drives, which are special folders in Google Drive that…

IronNet appoints Linda Zecher as CEO

IronNet’s Board of Directors has appointed Linda Zecher as Chief Executive Officer (CEO) effective immediately. Cameron Pforr, the company’s current Chief Financial Officer (CFO), has been appointed President of IronNet. GEN (Ret.) Keith Alexander will continue to serve as Chairman…

CIOs prioritize innovation over tech stack optimization

Despite economic obstacles and constraints on IT budgets, global CIOs maintain a positive outlook on the potential of technology to provide significant benefits for their organizations, according to Lenovo. Despite their optimism, the risks are real, as 83% are concerned…

How Google Cloud’s AML AI redefines the fight against money laundering

Google Cloud’s AML AI represents an advancement in the fight against money laundering. By replacing outdated transaction monitoring systems and embracing AI technology, financial institutions can now stay ahead of evolving financial crime risks, improve operational efficiency, ensure regulatory compliance,…

Free entry-level cybersecurity training and certification exam

The Ultimate Guide to Certified in Cybersecurity (CC) covers everything you need to know about the entry-level credential recognized by organizations worldwide. Inside, learn how CC starts you on your path to advanced cybersecurity certification and how to access free…

NETSCOUT enhances its AED with ML-based Adaptive DDoS Protection

NETSCOUT SYSTEMS has released its latest version of Arbor Edge Defense (AED) which includes new ML-based Adaptive DDoS Protection. According to NETSCOUT’s latest DDoS Threat Intelligence Report, there has been a significant increase in a new breed of dynamic DDoS…

Drata appoints Sydney Sloan as CMO

Drata announced the appointment of Sydney Sloan as the company’s first ever Chief Marketing Officer (CMO). Sloan will oversee global marketing at Drata to help market and brand leadership, fuel customer engagement, and accelerate the company’s commitment to delivering value…

Digilock introduces hardwired keyless lock solution

Digilock launched Pivot, hardwired built-in locks for new stationary furniture installations. Digilock brings its keyless lock experience to facilities requiring a hardwired power and data source for its permanent fixtures. Pivot Smart Locks are networked locks that operate with proprietary…

Perimeter 81 hires Gadi BenMark as CMO

Perimeter 81 announced the hiring of Gadi BenMark as Chief Marketing Officer. With more than 20 years experience in marketing strategy and business development across a variety of industries, BenMark brings extensive working knowledge to Perimeter 81. He reports to…

Netskope collaborates with Wipro to help users protect sensitive data

Netskope announced a new partnership with Wipro to deliver cloud-native Managed Secure Access Service Edge (SASE) and Managed Zero Trust Network Access (ZTNA) services to Wipro’s extensive global enterprise client portfolio. “As the global work environment transforms, our Security Cloud…

Owncast, EaseProbe security vulnerabilities revealed

Oxeye has uncovered two critical security vulnerabilities and recommends immediate action to mitigate risk. The vulnerabilities were discovered in Owncast (CVE-2023-3188) and EaseProbe (CVE-2023-33967), two open-source platforms written in Go. Owncast vulnerability (CVE-2023-3188) The first vulnerability was discovered in Owncast,…

Cybersecurity best practices while working in the summer

IT teams need help to monitor and enforce BYOD policies during summer months when more employees often travel or work remotely. In this Help Net Security video, Jeremy Ventura, Director, Security Strategy & Field CISO at ThreatX, discusses how employees…

Compliance seizes spotlight in the connected devices arena

Investment in connected device security has accelerated as upcoming legislation affecting the sector becomes more prominent, according to PSA Certified. This acceleration also highlights a noticeable difference from last year in the level of demand from industry customers and, more…