NetSTAR PhishCompass combats phishing threats
NetSTAR announced an advancement in phish detection technology with the introduction of PhishCompass. This innovative AI-supported solution marks a significant milestone in the ongoing battle against phishing threats and attacks, tailored for a wide.....»»
Stellar Cyber launches MITRE ATT&CK Coverage Analyzer
Stellar Cyber launched the MITRE ATT&CK Coverage Analyzer, enabling users to visualize the impact of data source changes on their ability to detect threats in their specific environments. With this new tool, free of charge to all existing customers,.....»»
How to improve response to emerging cybersecurity threats
Cyber resilience is a top priority for global organizations, and understanding threats plays a crucial role in building and maintaining a layered security approach. This Help Net Security round-up presents excerpts from previously recorded videos fea.....»»
LastPass users targeted by vishing attackers
The CryptoChameleon phishing kit is being leveraged by vishing attackers looking to trick LastPass users into sharing their master password. “Initially, we learned of a new parked domain (help-lastpass[.]com) and immediately marked the website.....»»
LastPass users targeted in phishing attacks good enough to trick even the savvy
Campaign used email, SMS, and voice calls to trick targets into divulging master passwords. Enlarge (credit: Getty Images) Password-manager LastPass users were recently targeted by a convincing phishing campaign that use.....»»
Authorities take down LabHost, phishing-as-a-service platform
Law enforcement from 19 countries severely disrupted one of the world’s largest phishing-as-a-service platform, known as LabHost. This year-long operation, coordinated at the international level by Europol, resulted in the compromise of LabHost’s.....»»
Enterprises face significant losses from mobile fraud
A recent Enea survey highlights a worrying trend in enterprise security: Following ChatGPT’s launch, 76% of businesses are inadequately protected against rising AI-driven vishing and smishing threats. In this Help Net Security video, John Hughe.....»»
92% of enterprises unprepared for AI security challenges
Most industries continue to run almost two or more months behind in patching software vulnerabilities, endpoints remain vulnerable to threats, and most enterprise PCs must be replaced to support AI-based technologies, according to the Absolute Securi.....»»
T-Mobile and Verizon workers offered $300 bribes for SIM swaps
SIM swaps are one of the biggest security threats we face, allowing criminals to access most services protected by two-factor authentication. The situation could be about to get even worse, as we learn of an apparent large-scale attempt to bribe T-Mo.....»»
Tijuana River among most endangered in America due to sewage crisis
The Tijuana River, with frequent flows of sewage and chemical-tainted waters, is among America's top endangered rivers, according to a report that spotlights threats to clean water nationwide......»»
Understanding next-level cyber threats
In this Help Net Security video, Trevor Hilligoss, VP of SpyCloud Labs, discusses the 2024 SpyCloud Identity Exposure Report, an annual report examining the latest trends in cybercrime and its impact. Researchers recaptured nearly 1.38 billion passwo.....»»
Escalation in harassment of New Zealand"s MPs threatens democracy, says study
From online abuse to threats of sexual violence, harassment of New Zealand's parliamentarians is on the rise, and becoming increasingly disturbing, University of Otago research shows......»»
Vercara UltraEdge offers protection against internet-based threats
Vercara launched UltraEdge, a comprehensive edge platform that includes an innovative Content Delivery Network (CDN), integrated application security, and edge compute. Powered by Edgio and supported through Vercara’s Security Operations Center (SO.....»»
Why RBLs and greylisting can’t stop modern email threats
Why RBLs and greylisting can’t stop modern email threats.....»»
eBook: Why CISSP?
As new cyber threats emerge daily in our connected world, there’s never been a greater urgency for cybersecurity professionals than now. What can CISSP certification do for you? In the eBook, hear from cybersecurity experts on how certification: Gi.....»»
Exposing the top cloud security threats
Many companies consider AI-powered threats to be the top cloud security threat to their business. Concerningly, less than half are confident in their ability to tackle those threats, according to a recent Aqua Security survey. In this Help Net Securi.....»»
Palo Alto Networks enhances Cortex XSIAM to help SecOps teams identify cloud threats
Palo Alto Networks announced a new milestone in how security operations centers (SOC) secure the cloud. The new innovations as part of Cortex XSIAM for Cloud bolster the Palo Alto Networks Cortex XSIAM platform to natively deliver Cloud Detection and.....»»
Cado Security teams up with Wiz to accelerate forensic investigations and minimize cloud threats
Cado Security has uveiled its partnership with Wiz and joins Wiz Integration (WIN) Platform. Cado Security enhances WIN by bringing the power of the Cado Security platform to the partner ecosystem so that Wiz customers can seamlessly integrate Cado i.....»»
The next wave of mobile threats
According to McAfee, apps, whether for communication, productivity, or gaming, are among the biggest threats to mobile security. Technavio expects the global mobile security software market to grow by $2.75 billion between 2020 and 2025, expanding at.....»»
In the Face of U.S. Ban Threats, TikTok’s Parent Company is More Profitable Than Ever
The Chinese tech giant continues to rake in billions in profits. But a potential U.S. TikTok ban looms. While TikTok faces an uncertain future in the U.S., its Chinese parent company continues to rake in cash. On Wednesday, Bloombe.....»»
Most cybercriminal threats are concentrated in just a few countries, new index shows
A newly developed World Cybercrime Index shows that most cybercriminal threats are concentrated in several countries, with different countries associated with distinct cybercrime types. Miranda Bruce (University of Oxford/University of New South Wale.....»»