Skybox Security announced Skybox 13.2, introducing enhancements to its Vulnerability and Threat Management solution. These updates mark a significant milestone in vulnerability prioritization and attack surface management, empowering organizations with clarity and control over their cybersecurity posture. Traditional vulnerability scanners…
Tag: Help Net Security
Regula updates Document Reader SDK to reduce the risk of identity theft
Liveness detection, both for individuals and their IDs, has become a cornerstone for a secure customer onboarding process. It is especially crucial in remote scenarios where document submission and verification are done via the Internet. With 65% of organizations globally…
Veeam and Microsoft develop AI solutions aimed at improving data protection
Veeam Software announced an extended, five-year strategic partnership with Microsoft to innovate new solutions for protecting customers by integrating Veeam’s product family and Microsoft Copilot and AI services. In addition to joint innovation, the companies will bring to market data…
Web-based PLC malware: A new potential threat to critical infrastructure
A group of researchers from Georgia Tech’s College of Engineering have developed web-based programmable logic controller (PLC) malware able to target most PLCs produced by major manufacturers. “Our Web-Based (WB) PLC malware resides in PLC memory, but ultimately gets executed…
Paramount Defenses Gold Finger 8.0 accurately assess and lockdown access in Active Directory
Paramount Defenses released Gold Finger version 8.0 for Microsoft Active Directory. From America to Israel, from the European Union to Saudi Arabia and from India to Australia, Active Directory is the foundation of cyber security at thousands of business and…
Today’s biggest AI security challenges
98% of companies surveyed view some of their AI models as vital for business success, and 77% have experienced breaches in their AI systems over the past year, according to HiddenLayer. The report surveyed 150 IT security and data science…
Tazama: Open-source real-time fraud management
Tazama is an open-source platform focused on improving fraud management within digital payment systems. Tazama marks a substantial transformation in the approach to financial monitoring and compliance worldwide. Previously, the financial sector struggled with proprietary solutions that were both expensive…
Major shifts in identity, ransomware, and critical infrastructure threat trends
In this Help Net Security video, Michelle Alvarez, Strategic Threat Analysis Manager at IBM X-Force, discusses the 2024 X-Force Threat Intelligence Index, revealing top threats and trends the team observed last year across its global engagements and how these shifts…
A cybercriminal is sentenced, will it make a difference?
The darknet is home to many underground hacking forums in which cybercriminals convene, freely sharing stories, tactics, success stories and failures. Their unguarded discussions allow our team to peek into the politics and ethics behind recent adversary activities. The threat…
78% of MSPs identify cybersecurity as prime IT challenge
Cybersecurity remained a top priority and an area of growth for MSPs, with 73% saying it’s a top revenue driver for their business, according to Kaseya. Ongoing cyberattack threats impact MSPs The threat of cyberattacks continues to weigh on MSPs…