Category: Help Net Security

The impact of location-based fraud

In this Help Net Security video, André Ferraz, CEO at Incognia, talks about the impact of location-based fraud, which is more prevalent than one would imagine, and it impacts different industries in many different ways. Fraudsters simply don’t want to…

Most critical security gaps in the public cloud

Orca Security released the 2022 State of the Public Cloud Security Report, which provides important insights into the current state of public cloud security and where the most critical security gaps are found. One of the report’s key findings is…

What do SOC analysts need to be successful?

Gurucul announced the results of a Black Hat USA 2022 security professionals survey with respondents indicating that insider threats were the most difficult type of attack for SOC analysts to detect, and that behavioral analytics was the most common piece…

Crypto giveaway scams continue to escalate

Group-IB has noted a fivefold increase in the number of domains used for crypto giveaway scams that involve fake YouTube streams in the first half of 2022. In addition to Vitalik Buterin, Elon Musk, and other crypto celebs, scammers started…

Ravin AI joins Guidewire PartnerConnect as a Solution partner

Ravin’s automated vehicle inspection tool enables non-professionals, like insurance customers, to capture the condition of a vehicle accurately. It leverages advanced computer vision and deep learning to analyze car damage and generate a 360-degree condition report or repair estimate. When…

Poly announces external API Marketplace utilizing RapidAPI

RapidAPI has launched Poly API Marketplace. Poly is a global outfitter of professional-grade audio and video technology. The newly formed hub is a single platform powered by RapidAPI for third-party software developers to find, connect to, and manage APIs across…

Postman 10 improves API governance and security

Postman has released Postman v10, offering new features around API governance and security, as well as expanded capabilities in collaboration and integration—and higher productivity. Postman continues to deliver on its core themes of productivity, quality, and governance while bringing to…

Code42 Incydr enhancements support DaaS and VDI environments

Code42 Software has unveiled that its Incydr product fully supports all major Desktop-as-a-Service (DaaS) and Virtual Desktop Infrastructure (VDI) environments. The Code42 Incydr product detects when valuable and sensitive files are moved to untrusted locations, including personal email and cloud…

How to improve public sector’s security strategy?

With international tensions heightened as we enter month eight of the war between Russia and Ukraine, it’s clear that a new era of intensifying state-sponsored attacks is upon us, especially those targeting public sector agencies and services. The Cybersecurity and…

Why shift left is burdening your dev teams

Security and compliance challenges are a significant barrier to most organizations’ innovation strategies, according to CloudBees. The survey also reveals agreement among C-suite executives that a shift left security strategy is a burden on dev teams. 76% of C-suite executives…

New infosec products of the week: September 16, 2022

Here’s a look at the most interesting products from the past week, featuring releases from Kingston Digital, Avetta, D3 Security, novoShield, and Socure. Kingston Digital releases IronKey Keypad 200 to deliver FIPS 140-3 Level 3 security for data Kingston Digital…

Most organizations consolidate to improve risk posture

A recent survey by Gartner found that 75% of organizations are pursuing security vendor consolidation in 2022, up from 29% in 2020. “Security and risk management leaders are increasingly dissatisfied with the operational inefficiencies and the lack of integration of…

CrowdStrike appoints Jennifer Johnson as CMO

Leveraging a 20-year track record in software marketing with expertise in cybersecurity and IT management, Jennifer Johnson is a seasoned CMO who has earned a reputation as a bold storyteller well known for helping companies define and dominate market categories.…

Aliro Quantum names Michael Wood as CMO

Aliro Quantum names its first Chief Marketing Officer (CMO), Michael Wood. Over the past 12 months, the company has continued to expand engagements with systems integrators, telecom providers, major government agencies, and academic and industry partners to design, architect, simulate,…

Linux variant of the SideWalk backdoor discovered

ESET researchers have discovered a Linux variant of the SideWalk backdoor, one of the multiple custom implants used by the SparklingGoblin APT group. Commands with different or missing implementation in the Linux version of SideWalk Targeting a Hong Kong university…

SMBs are hardest-hit by ransomware

Coalition announced the mid-year update to its 2022 Cyber Claims Report detailing the evolution of cyber trends, revealinig that small businesses have become bigger targets, overall incidents are down, and ransomware attacks are declining as demands go unpaid. During the…

6 key challenges technologists are facing today

Every organization that interacts with customers or consumers via web and mobile applications, and also as they transition to a hybrid workspace, means that they are interacting with more tools, cloud services, on-prem services, SaaS tools and interfaces. This creates…

Google leverages open-source fully homomorphic encryption library

Duality Technologies has unveiled that Google integrated its open-source Fully Homomorphic Encryption (FHE) Transpiler, which was built using XLS SDK and resides on GitHub, with the Duality-led OpenFHE, the open-source fully homomorphic encryption library, to make cryptographic expertise more accessible…

Netskope enhances Netskope Cloud Firewall capabilities of its SASE platform

Netskope has enhanced its Netskope Cloud Firewall, the firewall-as-a-service (FWaaS) component of its converged SASE platform. New security capabilities for Netskope Cloud Firewall help customers simplify operations, prevent threats, and provide consistent firewall coverage worldwide—anywhere their users are located. Businesses…

AlertEnterprise collaborates with Sentry to offer cyber-physical IAM

AlertEnterprise has partnered with Sentry to provide SentryCard as part of their cyber-physical identity access management and security solutions. Redefining security and trust The SentryCard empowers organizations with assured proof-of-identity for employees, while overcoming common privacy and hygiene risks associated…

LogRhythm names Gary Abad as VP of Global Channels

LogRhythm has appointed Gary Abad as VP of Global Channels. Abad joins LogRhythm as an accomplished channel sales leader with 25 years of experience in Senior Channel leadership positions with Trustwave, Ivanti, Meru Networks (acquired by Fortinet), Kaspersky Labs, and…

May Mitchell joins Open Systems as CMO

May Mitchell, as Open Systems‘ chief marketing officer (CMO), will lead the company’s global marketing strategy, branding, messaging, communications, demand generation, and partner marketing development efforts. Her specific goals include scaling new business growth and increasing customer retention by aligning…

Obsidian Security appoints Reena Choudhry as CRO

Reena Choudhry, as Obsidian Security‘s CRO, brings more than 20+ years of experience in enterprise sales leadership and partner-driven go-to-market strategies. She most recently served as the Chief Revenue Officer at Very Good Security and before that, served as the…

Phishers take aim at Facebook page owners

Phishers are looking to trick owners of Facebook pages with fake notices from the social network (i.e., Meta, the company behind Facebook, Instagram and WhatsApp), in an attempt to get them to part with sensitive information. The method they are…

Cyber attack trends vs. growing IT complexity

Ransomware is still the biggest threat to many organizations out there. Many organizations have fallen and you would think they’ve learned from it, but most companies still make one mistake: they think cyberattackers might not get after them since they’re…

CIS Critical Security Controls v8

The CIS Critical Security Controls (CIS Controls) are a prioritized set of safeguards to mitigate the most prevalent cyber-attacks against systems and networks. They are mapped to and referenced by multiple legal, regulatory, and policy frameworks. CIS Controls v8 has…

CFOs’ overconfidence in cybersecurity can cost millions

Kroll announced its report Cyber Risk and CFOs: Over-Confidence is Costly which found chief financial officers (CFOs) to be woefully in the dark regarding cybersecurity, despite confidence in their company’s ability to respond to an incident. The report, conducted by…

Oracle launches MySQL HeatWave on AWS

Oracle has unveiled that MySQL HeatWave is available on Amazon Web Services (AWS). MySQL HeatWave is the service that combines OLTP, analytics, machine learning, and machine learning-based automation within a single MySQL database. AWS users can now run transaction processing,…

Eric Schwartz joins CyrusOne as CEO

CyrusOne’s Board of Directors has elected Eric Schwartz as Chief Executive Officer, to be effective on or about October 1, 2022. Mr. Schwartz succeeds Dave Ferdman, who has served as CyrusOne’s interim President & Chief Executive Officer since July 28,…

U-Haul reports data breach, customers’ info exposed

U.S. moving and storage rental company U-Haul has suffered a data breach due to an unauthorized person having accessed an unspecified number of rental contracts, U-Haul’s parent company Amerco has revealed in a last week. It is not known have…

A closer look at ransomware attack patterns

Barracuda released its fourth-annual threat research report which looks at ransomware attack patterns that occurred between August 2021 and July 2022. This Help Net Security video highlights how ransomware attacks continue to be a threat to businesses of all sizes.…

5 Kali Linux books you should read this year

Kali Linux is a Linux distribution designed for digital forensics, penetration testing, security research, and reverse engineering. Here is a selection of books for different experience levels, you can either start from scratch or get advanced tips – there’s something…

Reimagining the approach to incident response

Today’s harsh reality is that incident response based on manual efforts is no longer successful for security teams. Staying on top of thousands of daily security alerts is exhausting and is nearly impossible to assess manually, especially for security analysts…

How prepared are organizations to tackle ransomware attacks?

HYCU has announced its State of Ransomware Preparedness report in partnership with ActualTech Media, which reveals that ransomware is an unavoidable risk for businesses, which is why ransomware preparedness is a top priority. The report captures detailed data intended to…

Tim Fleming joins Silverfort as Strategic Advisor

Unified Identity Protection company Silverfort has appointed Tim Fleming as Strategic Advisor. Responsible for all commercial and operational technology strategy at Deloitte for over 20 years, as CIO of Australia and APAC, Tim oversaw a team of more than 1300…

Thousands of QNAP NAS devices hit by DeadBolt ransomware (CVE-2022-27593)

QNAP Systems has provided more information about the latest DeadBolt ransomware campaign targeting users of its network-attached storage (NAS) devices and the vulnerability the attackers are exploiting (CVE-2022-27593). About CVE-2022-27593 CVE-2022-27593 exists because of an externally controlled reference that resolves…

Financial organizations fail to act on firmware breaches

In this Help Net Security video, Michael Thelander, Director Product Marketing at Eclypsium, discusses how financial organizations are failing to act despite the majority experiencing a firmware-related breach. 92% of CISOs in finance believe adversaries are better equipped at weaponizing…