Financial institutions are building stronger defenses against direct cyberattacks, but they may be overlooking a growing problem: their vendors. According to Black Kite’s new report, third-party risk has become one of the biggest cybersecurity threats facing the financial sector. Ransomware…
Tag: Help Net Security
New infosec products of the week: July 11, 2025
Here’s a look at the most interesting products from the past week, featuring releases from Barracuda Networks, Cynomi, Lepide, Tosibox, and Zenni Optical. Cynomi’s platform updates enable service providers to prioritize their security efforts Cynomi has launched new business impact…
Four arrested in connection with M&S, Co-op ransomware attacks
Four individuals suspected of having been involved in the ransomware attacks that hit UK-based retailers earlier this year have been arrested by the UK National Crime Agency. “Two males aged 19, another aged 17, and a 20-year-old female were apprehended…
Ruckus network management solutions riddled with unpatched vulnerabilities
Claroty researcher Noam Moshe has discovered serious vulnerabilities in two Ruckus Networks (formerly Ruckus Wireless) products that may allow attackers to compromise the environments managed by the affected software, Carnegie Mellon University’s CERT Coordination Center (CERT/CC) has warned. The vulnerabilities…
Sigma360 AI Investigator Agent reduces manual reviews
Sigma360 launched AI Investigator Agent, an autonomous GenAI agent that transforms how compliance teams handle risk alerts. This innovation leverages advanced AI and entity resolution models to clear easily identifiable false positives, reducing manual match reviews by up to 90%…
Cynomi’s platform updates enable service providers to prioritize their security efforts
Cynomi has launched new business impact analysis (BIA) and business continuity planning (BCP) features. Designed to help cybersecurity professionals identify and protect mission-critical business processes, these new capabilities enable service providers to prioritize security efforts effectively, streamline continuity planning, and…
Lepide Protect detects, prioritizes, and revokes excessive permissions
In a move set to redefine the way organizations manage data access and implement zero trust, Lepide launched Lepide Protect, an AI-powered permissions management solution designed to help organizations move beyond visibility and into action. Part of the 25.1 release of…
Fake online stores look real, rank high, and trap unsuspecting buyers
Shopping on a fake online store can lead to more than a bad purchase. It could mean losing money, having your identity stolen, or even getting malware on your device. E-shop scams rose by 790% in the first quarter of…
What EU’s PQC roadmap means on the ground
In this Help Net Security interview, David Warburton, Director at F5 Labs, discusses how the EU’s Post-Quantum Cryptography (PQC) roadmap aligns with global efforts and addresses both the technical and regulatory challenges of migrating to PQC. Warburton also outlines practical…
Open source has a malware problem, and it’s getting worse
Sonatype has published its Q2 2025 Open Source Malware Index, identifying 16,279 malicious open source packages across major ecosystems such as npm and PyPI. This brings the total number of malware packages discovered by the company to 845,204. Compared to…