Advertisement
Top

Tag: Security


Privacy protection, Security

AU10TIX expands its INSTINCT platform to stop deepfakes and swarm attacks

July 26, 2022

Via: Help Net Security

AU10TIX announced expanded capabilities to strengthen fraud mitigation defense through its fraud intelligence platform, INSTINCT. INSTINCT, which uses traffic-level intelligence sourced from a global consortium of neural-network partners, now can deliver protection for stopping fraud like swarm attacks, deep fakes […]


Threats & Malware, Virus & Malware

IoT Botnets Fuels DDoS Attacks – Are You Prepared?

July 26, 2022

Via: Threat Post

While data breaches and ransomware are still considered among the more significant concern for businesses, the threats sometimes come from a direction we weren’t expecting. Cybercriminals use botnets for various malicious purposes, most significantly for DDoS attacks against targets. The […]


Cyber-crime, Identity theft

Why firms need to harness identity management before it spirals into an identity crisis

July 25, 2022

Via: Help Net Security

Digital transformation is at the top of every organization’s agenda today. But while it is easy to make bold, forward-looking plans on paper, the reality of implementing digitalization can be slow and frustrating work. Many organizations are deeply entrenched in legacy […]


Threats & Malware, Virus & Malware

McAfee expands collaboration with Visa to protect people and businesses from threats

July 25, 2022

Via: Help Net Security

McAfee expanded partnership with Visa that enables Visa partners in the United Kingdom to offer online protection solutions to Visa Business cardholders. In an increasingly digitized world, small businesses find themselves a key target of hackers, with more than half of the data […]


Threats & Malware, Virus & Malware

WithSecure Detectree increases visibility on suspicious activities

July 22, 2022

Via: Help Net Security

Many companies struggle to understand malicious activity and their effects while a security incident is in progress. It eats up precious time and resources that defenders need to contain the attack and minimize damage. However, a new open-source tool built […]


Network security, Security

New infosec products of the week: July 22, 2022

July 22, 2022

Via: Help Net Security

The Digital Identify Protection solution leverages Resecurity’s threat intelligence data from dark web activity, data leaks, credentials compromise, hacking activity, cyberespionage, supply chain and third-party data breaches — all of which are catalysts for major security incidents. Darktrace launched Darktrace PREVENT, an interconnected […]


Cloud security, Security

60% of IT leaders are not confident about their secure cloud access

July 21, 2022

Via: Help Net Security

60% of IT and security leaders are not confident in their organization’s ability to ensure secure cloud access, even as adoption continues to grow across a diverse range of cloud environments, according to research from the Ponemon Institute. The Global […]


Access control, Application security, Security

Cato DLP secures and optimizes access to all applications

July 20, 2022

Via: Help Net Security

Cato DLP is part of Cato SSE 360, the only Security Service Edge (SSE) architecture to provide total visibility, optimization, and control of all traffic while providing a seamless migration path to full SASE transformation. Cato has also added Cato […]


Network security, Security

Everbridge Service Intelligence accelerates IT incident response

July 15, 2022

Via: Help Net Security

Everbridge introduced a new correlation and analytics module enabling IT organizations to streamline digital operations and reduce unplanned work while freeing more time for innovation. Available as part of Everbridge’s Digital Operations solutions bundle, Service Intelligence minimizes digital disruptions and […]


Application security, Security

CertiK launches new web3 security features for addressing risk on crypto projects

July 15, 2022

Via: Help Net Security

The Skynet service, launched in June 2021, uses a comprehensive set of signals, curated from code scanning analysis, on chain security analytics, and machine learning to provide 24/7 monitoring of threats for crypto projects. To date, Skynet has helped to […]


Mobile, Mobile security

Mobile apps are a privacy nightmare. The Roe decision put them center stage

July 14, 2022

Via: CSO Online

When news broke on June 24th that the U.S. Supreme Court had officially reversed Roe v. Wade, declaring that the constitutional right to abortion no longer exists, privacy advocates almost immediately began to ring alarm bells. The right to an […]


Network security, Security

New Flashpoint offering automates incident response workflows

July 14, 2022

Via: CSO Online

A new low-code security automation platform designed for ease of use was introduced Tuesday by Flashpoint, a threat intelligence company. Called Automate, the platform aims to lower the barriers typically associated with security automation. “Automation solutions can be great, but […]


Threats & Malware, Vulnerabilities

The enemy of vulnerability management? Unrealistic expectations

July 13, 2022

Via: Help Net Security

Organizations vary by size, industry, level of maturity, but one thing that they all have in common is needing to know how to quickly remediate security vulnerabilities. As an experienced vulnerability management professional and a former system administrator who specialized […]


Network security, Threats & Malware, Virus & Malware

Cybersecurity watchdog asks lawyers for help in the fight against ransomware

July 8, 2022

Via: TechRadar

Whether or not to pay a ransomware demand has long been an ongoing conundrum for organizations worldwide, and the UK government has decisively told solicitors to advise their clients not to pay up. A joint letter from the Information Commissioner […]


Data loss, Threats & Malware

Protecto and Snowflake help customers identify data protection issues

July 8, 2022

Via: Help Net Security

Protecto brings artificial intelligence and privacy engineering to Snowflake, the Data Cloud company, so that joint customers can identify data protection issues before data breaches and customer trust violations occur. Data is the backbone of today’s businesses, but it is […]


Network security, Security

Infosec products of the month: June 2022

July 1, 2022

Via: Help Net Security

Here’s a look at the most interesting products from the past month, featuring releases from: Acronis, Arcserve, Black Kite, Cavelo, Code42, ComplyCube, Cynet, Elastic, ESET, Feroot, Fusion Risk Management, G-Core Labs, Hillstone Networks, Incognia, Living Security, Lumu, NetWitness, Optiv Security, […]


Access control, Security

Rafay Systems Paralus helps users achieve secure access to Kubernetes clusters

June 30, 2022

Via: Help Net Security

Rafay Systems launched a new open-source software project named Paralus to enable secure, audited access for developers, operations, SREs and CI/CD tools to remote Kubernetes (K8s) clusters. Paralus offers access management for developers, architects, and CI/CD tools to remote K8s […]


Network security, Security

Enveil ZeroReveal ML Encrypted Training enables secure usage of cross-silo data sources

June 29, 2022

Via: Help Net Security

Enveil released its new encrypted training solution, ZeroReveal ML Encrypted Training (ZMET). The enterprise-ready product extends the boundary of trusted compute by enabling encrypted federated learning and the secure usage of disparate, decentralized datasets for machine learning applications. Designed to […]


Threats & Malware, Vulnerabilities

New UnRAR Vulnerability Could Let Attackers Hack Zimbra Webmail Servers

June 29, 2022

Via: The Hacker News

A new security vulnerability has been disclosed in RARlab’s UnRAR utility that, if successfully exploited, could permit a remote attacker to execute arbitrary code on a system that relies on the binary. The flaw, assigned the identifier CVE-2022-30333, relates to […]


Threats & Malware, Vulnerabilities

Mitre shared 2022 CWE Top 25 most dangerous software weaknesses

June 29, 2022

Via: Security Affairs

The presence of these vulnerabilities within the infrastructure of an organization could potentially expose it to a broad range of attacks. “Welcome to the 2022 Common Weakness Enumeration (CWE™) Top 25 Most Dangerous Software Weaknesses list (CWE™ Top 25). This […]