Hide My Email is a service that comes with iCloud+, Apple’s subscription-based service. It allows users to generate one-time-use or reusable email addresses that forward messages to their personal inbox without ever revealing their actual email address. This means it…
Tag: Help Net Security
Zyxel CPE devices under attack via critical vulnerability without a patch (CVE-2024-40891)
CVE-2024-40891, a command injection vulnerability in Zyxel CPE Series telecommunications devices that has yet to be fixed by the manufacturer, is being targeted by attackers, cybersecurity company Greynoise has warned. Successful exploitation would allow attackers to execute arbitrary commands on…
Swimlane Vulnerability Response Management offers risk-based prioritization
Swimlane announced Vulnerability Response Management (VRM) Solution that extends beyond siloed vulnerability management by offering risk-based prioritization, exploit intelligence and recommended remediation workflows. Swimlane AI automation solutions combine the power of AI with human expertise, enabling faster, more accurate decision-making…
DeepSeek’s popularity exploited by malware peddlers, scammers
As US-based AI companies struggle with the news that the recently released Chinese-made open source DeepSeek-R1 reasoning model performs as well as theirs for a fraction of the cost, users are rushing to try out DeepSeek’s AI tool. In the…
authID PrivacyKey protects users’ biometric identities
authID released PrivacyKey, a solution for protecting user biometric data while also avoiding all the compliance issues and risks related to biometric information storage. With the addition of PrivacyKey, authID serves as the ideal partner for organizations that previously delayed…
AuthID PrivacyKey protects users’ biometric identities
authID released PrivacyKey, a solution for protecting user biometric data while also avoiding all the compliance issues and risks related to biometric information storage. With the addition of PrivacyKey, authID serves as the ideal partner for organizations that previously delayed…
Cyberhaven for AI provides visibility into AI tool usage
Cyberhaven launched Cyberhaven for AI, a solution that enables enterprises to securely adopt generative AI while protecting sensitive corporate data. The announcement comes as research reveals a 485% increase in corporate data being shared with AI tools, with over 73%…
How Lazarus Group built a cyber espionage empire
Since September 2024, SecurityScorecard’s STRIKE team has been investigating Lazarus Group’s activity, uncovering key details about their infrastructure. Despite variations in payload delivery and obfuscation techniques, the campaign relied on a consistent C2 framework. Hidden control panel Through deep analysis,…
Absolute Resilience Platform updates improve resilience across endpoints
Absolute Security announced that the Absolute Resilience Platform has expanded to provide customers with integrated, resilient, and automated patch management, vulnerability scanning and remediation, workflow automation and remote “one-click” endpoint rehydration. Unified with existing Absolute capabilities, this single-platform approach delivers…
Bitwarden centralizes cryptographic key management
Bitwarden announced it has strengthened its Password Manager with secure shell management (SSH). This update centralizes cryptographic key management, enabling secure storage, import, and generation of SSH keys directly within the Bitwarden vault to enhance workflows for developers and IT…
Cyberhaven for AI secures enterprise AI usage
Cyberhaven launched Cyberhaven for AI, a solution that enables enterprises to securely adopt generative AI while protecting sensitive corporate data. The announcement comes as research reveals a 485% increase in corporate data being shared with AI tools, with over 73%…
Preparing financial institutions for the next generation of cyber threats
In this Help Net Security interview, James Mirfin, SVP and Head of Risk and Identity Solutions at Visa, discusses key priorities for leaders combating fraud, the next-generation threats institutions must prepare for, and the role of collaboration between financial sectors…
SEC and FCA fines: Issues jump
The financial sector faces communication compliance challenges as organizations struggle to maintain oversight across communication channels. Adding to the complexity is the unexpected rise of unconventional platforms, such as Snapchat, used for business operations. In this Help Net Security video,…
Cybersecurity crisis in numbers
The number of US data compromises in 2024 (3,158) decreased 1% compared to 2023 (3,202), 44 events away from tying a record for the number of compromises tracked in a year, according to the Identity Theft Resource Center. Data breach…
Only 13% of organizations fully recover data after a ransomware attack
Ransomware attacks are disrupting and undermining business operations and draining revenue streams, according to Illumio. Findings from the study reveal that 58% of organizations had to shut down operations following a ransomware attack, up from 45% in 2021. 40% reported…
Leostream Privileged Remote Access secures access to corporate resources
Leostream announced a new service to manage and secure organizational resources accessed by third parties—such as external contractors, service providers, and other non-employees—with third-party privileged status. Third-party users often require access to an organization’s infrastructure for IT-related tasks, to collaborate…
BackBox releases Network Cyber Resilience Platform
BackBox launched Network Cyber Resilience Platform. With business productivity at risk due to the complexity of managing too many tools, monotonous manual tasks, and limited time and resources, BackBox is committed to supporting the network and security teams responsible for…
Barracuda strengthens security capabilities in Email Protection
Barracuda Networks unveiled advancements to Barracuda Email Protection. These updates – including flexible deployment options, enhanced security capabilities, and more – make it easier than ever for organizations of all sizes and IT environments to defend against increasingly sophisticated and…
Hiya AI Phone blocks spam and irrelevant calls
Hiya has introduced Hiya AI Phone, an AI call assistant mobile app. Designed for busy professionals, Hiya AI Phone acts like a personal assistant, saving time by screening unwanted phone calls, safeguarding against phone scams, and taking notes during calls…
ForensicScope Regula 4125 detects counterfeit documents
Regula has launched the portable and autonomous ForensicScope Regula 4125. The new device enables ID verification in any place and environment: at border and inland checkpoints, at airports, in transport, etc. Although the Regula 4125 is only smartphone-sized, it is…