Tag: Help Net Security

McAfee releases online protection solution for small businesses

McAfee announced McAfee Business Protection, a new comprehensive security solution for small business owners in collaboration with Dell Technologies. McAfee Business Protection helps Dell small business customers stay ahead of cyber threats and vulnerabilities with security, identity and dark web…

Aviatrix appoints Doug Merritt as Chairman, CEO, and President

Aviatrix announced the appointment of Doug Merritt as CEO and President. He will also join the Aviatrix Board of Directors as Chairman. Merritt will succeed Steve Mullaney, who for the past four years has built Aviatrix into an industry-defining enterprise…

New infosec products of the week: June 23, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Cymulate, Edgescan, ESET, iStorage, and Netskope. iStorage launches datAshur PRO+C with Type-C USB interface iStorage’s new datAshur PRO+C is a user-friendly USB 3.2 (Gen 1)…

Operationalizing zero trust in the cloud

Some organizations have bought into the idea that workloads in the cloud are inherently more secure than those on premises. This idea is reinforced by the concept that the cloud service provider (CSP) assumes responsibility for security. However, while a…

Insurance companies neglect basic email security

Only 3.54% of of insurance companies have correctly implemented basic phishing and spoofing protection, according to EasyDMARC. DMARC standard adoption Insurers operate using highly sensitive, private information that they’ve been trusted by clients and customers to protect. They function in…

Exabeam appoints Adam Geller as CEO

Exabeam has unveiled that Adam Geller has been appointed as CEO. Michael DeCesare is stepping down as CEO and President, but will continue to serve as a Board advisor. Geller is a well-respected Silicon Valley leader who has built a…

vCISO Directory helps SMBs manage their cybersecurity

The industry’s first-ever directory of virtual CISO (vCISO) service providers has gone live. This list of vCISO providers means that SMBs can tap the expertise of qualified cybersecurity professionals to protect their digital assets and ensure compliance. To help organizations…

Photos: Infosecurity Europe 2023, part 3

Infosecurity Europe is taking place at ExCeL London from 20-22 June 2023 and Help Net Security is on site. The first gallery is available here, and the second gallery is here. Here’s a closer look at the conference featuring: Swimlane,…

ChatGPT shows promise in detecting phishing sites

ChatGPT can be used to generate phishing sites, but could it also be used to reliably detect them? Security researchers have tried to answer that question. Can ChatGPT detect phishing sites based on URLs? Kaspersky researchers tested 5,265 (2322 phishing…

Cloud-native security hinges on open source

Technologies like Kubernetes and K3S are synonymous with the success of cloud native computing and the power of open source. It is no accident they have steamrolled the competition. As enterprises look to secure cloud-native environments, open source is the…

Unraveling the multifaceted threats facing telecom companies

In today’s interconnected world, telecom companies serve as gateways, connecting individuals, businesses, and governments. However, this role also makes them prime targets for cyberattacks. From DDoS attacks to sophisticated spyware infiltration, telecom providers face a wide range of threats that…

Island integrates DLP capabilities for ChatGPT, Bard, and other AI

Island announced an enterprise-grade set of Data Loss Prevention (DLP) capabilities for all popular interactive AI-type applications including ChatGPT, Bard and others, within its Enterprise Browser. These features are available in multiple deployment modes to accommodate various interaction types; integrated…

How to create SBOMs for container images

The importance of software bills of materials (SBOMs) has grown substantially in recent years as organizations recognize the need for greater transparency in the software supply chain. This focus on SBOMs is a response to increasing cybersecurity threats and legislative…

Compromised ChatGPT accounts garner rapid dark web popularity

Compromised credentials were found within the logs of info-stealing malware traded on illicit dark web marketplaces over the past year, according to Group-IB. The number of available logs containing compromised ChatGPT accounts reached a peak of 26,802 in May 2023.…

Photos: Infosecurity Europe 2023, part 2

Infosecurity Europe 2023 is taking place at ExCeL London from 20-22 June 2023 and Help Net Security is on site. The first gallery is available here. Here’s a closer look at the conference featuring: Island, ThreatAware, Adaptiva, Infoblox, Noetic Cyber,…

Infosecurity Europe 2023 video walkthrough

Infosecurity Europe 2023 is taking place in London this week, and this video provides a closer look at this year’s event. The post Infosecurity Europe 2023 video walkthrough appeared first on Help Net Security. This article has been indexed from…

NOS chooses Censys to monitor its attack surface

Censys has unveiled that NOS chose Censys to monitor its attack surface. Censys’ technology provides NOS with complete visibility into its external-facing infrastructure, simplifies its monitoring process and eliminates irrelevant alerts. As an internet provider for both the B2B and…

IRONSCALES boosts email security with generative AI capabilities

IRONSCALES announced the Beta launch of Themis Co-pilot for Microsoft Outlook, a GPT-powered chat assistant for self-service threat reporting. Powering Themis Co-pilot is PhishLLM, a language model (LLM) hosted within the IRONSCALES infrastructure, which is the first in the IRONSCALES…

eSentire AI Investigator provides real-time answers to security data queries

eSentire launched eSentire AI Investigator, using generative AI powered cybersecurity to augment eSentire XDR Platform users of all levels with expertise to build their organization’s cyber resilience. eSentire’s platform has captured over 1 million expert-led cybersecurity investigations and response actions,…

ExaGrid Version 6.3 guards customers against external threats

ExaGrid released software Version 6.3, which started shipping in June 2023. With each software update in Version 6, ExaGrid has been adding additional layers of security to its Tiered Backup Storage, which already guards against external threats by utilizing a…

Photos: Infosecurity Europe 2023

Infosecurity Europe is taking place at ExCeL London from 20-22 June 2023 and Help Net Security is on site. Here’s a closer look at the conference featuring: Island, Crowdstrike, Panorays, ManageEngine, Mazebolt, Cobalt, Intruder, TikTok, and CensorNet. The post Photos:…

Malwarebytes launches Reseller Partner Program to drive partner profitability

Malwarebytes launched the Malwarebytes Reseller Partner Program. The revamped program is dedicated to helping partners create profitable and consistent business growth through innovative endpoint security solutions and leading channel incentives such as lucrative base and multi-year discounts. “Today’s evolving threat…

Zyxel patches critical vulnerability in NAS devices (CVE-2023-27992)

Zyxel has released firmware patches for a critical vulnerability (CVE-2023-27992) in some of its consumer network attached storage (NAS) devices. About CVE-2023-27992 CVE-2023-27992 is an OS command injection flaw that could be triggered remotely by an unauthenticated attacker, via a…

10 open-source recon tools worth your time

Recon is the initial stage in the penetration testing process. It’s a vital phase allowing the tester to understand their target and strategize their moves. Here are ten open-source recon tools that deserve to be in your arsenal. Altdns Altdns…

The significance of CIS Control mapping in the 2023 Verizon DBIR

Verizon’s recently released 2023 Data Breach Investigation Report (DBIR) provides organizations with a comprehensive analysis of the evolving threat landscape and valuable insights into incident types and vulnerabilities. This year, the report includes the mapping of CIS (Center for Internet…

What if the browser was designed for the enterprise?

Bradon Rogers, Chief Customer Officer at Island, provides an overview of the Island Enterprise Browser. Learn more at Infosecurity Europe 2023 – June 20-22, 2023. The post What if the browser was designed for the enterprise? appeared first on Help…

Demand for STEM training skyrockets

The rapid pace of globalization, digital transformation, and AI advancements have created a renewed demand for digital and human skills among US learners, according to Coursera. “The rise of digital jobs and remote work is creating unprecedented opportunities for local…

The future of passwords and authentication

In this Help Net Security video, Michael Crandell, CEO of Bitwarden, discusses the future of passwords and authentication. Although interest in passwordless technology, which aims to eliminate the need for passwords, is relatively low, 65% of consumers are receptive to…

ESET PROTECT Elite protects users against ransomware and zero-day threats

ESET expanded its unified cybersecurity platform, ESET PROTECT, with a new subscription tier for businesses requiring all-in-one prevention, detection and response. Available immediately, ESET PROTECT Elite delivers enterprises, small and midsize businesses (SMBs), and channel partners with enterprise-grade XDR for…

iStorage launches datAshur PRO+C with Type-C USB interface

iStorage added a new encrypted flash drive to its highly successful datAshur range. The new datAshur PRO+C, with the Type-C interface, is the flash drive pending the new FIPS 140-3 Level 3 validation scheme. This offers robust guarantees as to…

Microsoft confirms DDoS attacks against M365, Azure Portal

The Microsoft 365 and Azure Portal outages users expirienced this month were caused by Layer 7 DDoS attacks, Microsoft has confirmed on Friday. The DDoS attacks against Microsoft 365 and Azure Portal Throughout the first half June 2023 Microsoft confirmed,…

Goodbyes are difficult, IT offboarding processes make them harder

When employees, contractors and service providers leave an organization, they take with them knowledge, capabilities, and professional achievements. They should leave behind any proprietary or confidential data belonging to the organization, but Osterman Research found that 69% of organizations polled…

Three cybersecurity actions that make a difference

Organizations that closely align their cybersecurity programs to business objectives are 18% more likely to achieve target revenue growth and market share and improve customer satisfaction, as well as 26% more likely to lower the cost of cybersecurity breaches/incidents, on…

Exploring the role of AI in cybersecurity

In this Help Net Security round-up, we present parts of previously recorded videos from experts in the field that discuss about how AI technologies will impact the cybersecurity industry in the next few years. AI is a powerful tool in…

Virtana acquires OpsCruise to help users manage complex modern environments

Virtana acquired cloud observability platform, OpsCruise, a purpose-built cloud-native, and Kubernetes observability platform. OpsCruise’s solution empowers ITOps/DevOps/SRE teams to predict performance degradation and pinpoint its cause. This is enabled by the deep understanding of Kubernetes and popular technologies used in…

Photos: BSidesLjubljana 0x7E7

BSidesLjubljana 0x7E7 is taking place today at the Computer History Museum, and Help Net Security is on site. Here’s a look at the event featuring Solar Designer (Openwall), Boris Sieklik (MongoDB), Darko Kukovec (Infinum), and Daniel Poposki. The post Photos:…

New infosec products of the week: June 16, 2023

Here’s a look at the most interesting products from the past week, featuring releases from NETSCOUT, Okta, Quantinuum, Seceon, and Zilla Security. Okta Device Access enables businesses to secure access to both devices and applications As part of Okta’s Workforce…

Red teaming can be the ground truth for CISOs and execs

This year, against the backdrop of attacks on everyone from healthcare institutions and schools to financial services organizations, as well as the introduction of legislation across the UK and EU to move security up the agenda, cybersecurity has undoubtedly become…

Introducing the book: Visual Threat Intelligence

In this Help Net Security video interview, Thomas Roccia, Senior Security Researcher at Microsoft, discusses his new book – Visual Threat Intelligence. The book covers a wide range of topics, including: Threat intelligence fundamentals and methodologies TTP, Diamond Model of…

Coalition ESS helps enterprises mitigate their most critical risks

Coalition announced the Coalition Exploit Scoring System (Coalition ESS), a vulnerability scoring system that helps risk managers mitigate potential cyber threats. Developed by Coalition Security Labs, the company’s research and innovation center, Coalition ESS is a security risk prioritization scoring…

OneSpan Notary enhancements secure digital identities

OneSpan announced expanded features for OneSpan Notary, a next-generation, all-in-one, cloud-connected solution that enables organizations to transform the way notaries and customers complete agreements and notarize documents in a secure and trusted environment. These new capabilities will now support Remote…

VMware fixes critical flaws in Aria Operations for Networks (CVE-2023-20887)

VMware has fixed two critical (CVE-2023-20887, CVE-2023-20888) and one important vulnerability (CVE-2023-20889) in Aria Operations for Networks (formerly vRealize Network Insight), its popular enterprise network monitoring tool. About the vulnerabilities (CVE-2023-20887, CVE-2023-20888,CVE-2023-20889) CVE-2023-20887 is a pre-authentication command injection vulnerability that…

How cybercriminals target energy companies

In this Help Net Security video, Jim Simpson, Director of Threat Intelligence at Searchlight Cyber, discusses how cybercriminals employ specialized strategies when targeting energy companies. This is primarily due to the sensitive and valuable information these organizations hold and their…

How secure is your vehicle with digital key technology?

Digital key technology allows mobile devices to streamline approval for everyday access points, making it a fitting solution for the automotive industry. While there are a few different approaches to implementing digital keys for automotive use, a secure digital key…

Cyber debt levels reach tipping point

The tension between difficult economic conditions and the pace of technology innovation, including the evolution of AI, is influencing the growth of identity-led cybersecurity exposure, according to CyberArk. The CyberArk’s report details how these issues – allied to an expected…

What is a browser doing at Infosecurity Europe 2023?

What if the enterprise had complete control over the browser? What would it do for security, productivity, for work itself? Ari Yablok, Head Of Brand at Island, invites you to visit Island at Infosecurity Europe 2023 (Stand S75) to learn…

Small organizations outpace large enterprises in MFA adoption

The use of MFA has nearly doubled since 2020 and that phishing-resistant authenticators represent the best choice in terms of security and convenience for users, according to Okta. MFA authentication gains traction MFA authentication has steadily gained traction across organizations…

Zilla Security introduces new suite of identity security SaaS solutions

Zilla Security announced Zilla Secure and Segregation of Duties (SOD), two SaaS solutions that enable enterprise-wide identity security for cloud-based applications and infrastructure, SaaS, and legacy applications. “Organizations today face a stark reality around their cloud security posture,” said Deepak…

Quantum Origin Onboard strengthens device security against cyberattacks

Quantinuum launched Quantum Origin Onboard, an innovation in cryptographic key generation that provides quantum computing hardened cyber protection for a wide range of connected devices by maximizing the strength of keys generated within the devices themselves. The risk of cyberattacks…

Rom Kosla joins HPE as CIO

HPE announced that Rom Kosla has been appointed Chief Information Officer (CIO). “The performance and agility of our IT team is critical to ensuring our customers and partners have great experiences doing business with us, and that our team members…

Silent Push launches with a total of $10 million in total funding

Silent Push launches with a total of $10M in seed funding led by global cybersecurity specialist investor Ten Eleven Ventures. Silent Push takes a unique approach to identifying emerging cyber threats by providing the most comprehensive view of global internet-facing…

Sycope 2.3 detects network problems and identifies security threats

Sycope is introducing version 2.3 of its network monitoring and security tool. The solution is based on real-time flow analysis enriched with business context and supports companies in securing performance and improving IT security. The new version brings numerous improvements…

Switzerland under cyberattack

Swiss government websites are under DDoS attacks, but several ransomware gangs have also turned their sights on Swiss government organizations, cantonal governments, cities and companies in the last few months. Government sites under DDoS attacks “Several Federal Administration websites are/were…

Eviden AIsaac Cyber Mesh helps enterprises detect security threats

Eviden, an Atos business, announces AIsaac Cyber Mesh, a next generation of cybersecurity detection and response, reinforced by AWS Security Data Lake and powered by generative AI technologies. AIsaac Cyber Mesh offers an advanced end-to-end detection, response, and recovery solution,…

Ignoring digital transformation is more dangerous than a recession

Business leaders worldwide understand they need to invest in digital transformation to meet a new innovation imperative, despite ongoing macroeconomic pressures and an increasingly uncertain, competitive business environment, according to Insight. The pandemic accelerated transformation in every industry as organizations…

Enhancing security team capabilities in tough economic times

According to ESG, 70% of cybersecurity pros expect budget cuts or freezes this year, which, in turn, will trigger project delays and greater vendor scrutiny. Understaffing and low budgets are ever-present challenges, but security teams are uniquely affected by alert…

3 ways we’ve made the CIS Controls more automation-friendly

Compliance obligations that support data privacy and cyber risk are nearly ubiquitous. Not only that, but they’re expanding. According to Gartner, government regulations covering these areas of emphasis will apply to five billion citizens and more than 70% of global…

IT providers become go-to for cybersecurity advice

61% of SMBs have been hit by a successful cyberattack in the last year, according to BlackFog. The research study, which examined the business impact of cybersecurity for organizations in the US and UK, also revealed the growing importance of…