Advertisements


NetSTAR PhishCompass combats phishing threats

NetSTAR announced an advancement in phish detection technology with the introduction of PhishCompass. This innovative AI-supported solution marks a significant milestone in the ongoing battle against phishing threats and attacks, tailored for a wide.....»»

Category: securitySource:  netsecurityFeb 26th, 2024

78% of MSPs identify cybersecurity as prime IT challenge

Cybersecurity remained a top priority and an area of growth for MSPs, with 73% saying it’s a top revenue driver for their business, according to Kaseya. Ongoing cyberattack threats impact MSPs The threat of cyberattacks continues to weigh on MS.....»»

Category: securitySource:  netsecurityRelated NewsMar 7th, 2024

Major shifts in identity, ransomware, and critical infrastructure threat trends

In this Help Net Security video, Michelle Alvarez, Strategic Threat Analysis Manager at IBM X-Force, discusses the 2024 X-Force Threat Intelligence Index, revealing top threats and trends the team observed last year across its global engagements and.....»»

Category: securitySource:  netsecurityRelated NewsMar 7th, 2024

How to create an efficient governance control program

Your success as an organization, especially in the cyber realm, depends on your security posture. To account for the ongoing evolution of digital threats, you need to implement robust governance control programs that address the current control envir.....»»

Category: securitySource:  netsecurityRelated NewsMar 6th, 2024

NetApp cyber-resiliency capabilities protect both primary and secondary data

NetApp announced cyber-resiliency capabilities that will equip customers to better protect and recover their data in the face of ransomware threats. NetApp integrates artificial intelligence (AI) and machine learning (ML) directly into enterprise pri.....»»

Category: securitySource:  netsecurityRelated NewsMar 5th, 2024

Silobreaker enhances threat intelligence platform with MITRE ATT&CK TTP detection capabilities

Silobreaker announced an integration with MITRE ATT&CK Matrix for Enterprise, Industrial Control Systems (ICS) and Mobile, to help organizations better understand threats associated with malware, threat actors and industries. This latest enhancement.....»»

Category: securitySource:  netsecurityRelated NewsMar 4th, 2024

Phishers target FCC, crypto holders via fake Okta SSO pages

A new phishing campaign is using fake Okta single sign-on (SSO) pages for the Federal Communications Commission (FCC) and for various cryptocurrency platforms to target users and employees, Lookout researchers have discovered. The phishing campaign B.....»»

Category: securitySource:  netsecurityRelated NewsMar 4th, 2024

Darktrace partners with Xage Security to detect threats deep inside IT and OT systems

Darktrace and Xage Security announced a new partnership to help businesses prevent cyberattacks and insider threats in critical environments. This collaboration brings together Xage Security’s zero trust protection with Darktrace’s AI-pow.....»»

Category: securitySource:  netsecurityRelated NewsMar 4th, 2024

95% believe LLMs making phishing detection more challenging

More than 95% of responding IT and security professionals believe social engineering attacks have become more sophisticated in the last year, according to LastPass. Recent AI advancements, particularly generative AI, have empowered cybercriminals to.....»»

Category: securitySource:  netsecurityRelated NewsMar 4th, 2024

Maximizing Security and Efficiency in Your Business with Linux

In the bustling digital marketplace of today, businesses are like ships navigating through a sea of data, facing storms of cyber threats and waves of technological challenges. At the heart of these vessels, ensuring a smooth and secure voyage, lies t.....»»

Category: topSource:  unixmenRelated NewsMar 2nd, 2024

BobTheSmuggler: Open-source tool for undetectable payload delivery

BobTheSmuggler is an open-source tool designed to easily compress, encrypt, and securely transport your payload. It basically enables you to hide a payload in plain sight. BobTheSmuggler is helpful in phishing campaign assessments, data exfiltration.....»»

Category: securitySource:  netsecurityRelated NewsFeb 29th, 2024

Vishing, smishing, and phishing attacks skyrocket 1,265% post-ChatGPT

76% of enterprises lack sufficient voice and messaging fraud protection as AI-powered vishing and smishing skyrocket following the launch of ChatGPT, according to Enea. Enterprises report significant losses from mobile fraud 61% of enterprises still.....»»

Category: topSource:  informationweekRelated NewsFeb 29th, 2024

European retailer Pepco loses €15.5 million in phishing (possibly BEC?) attack

Pepco Group has confirmed that its Hungarian business has been hit by a “sophisticated fraudulent phishing attack.” The European company, which operates shops under the Pepco, Poundland and Dealz brands, said that the company lost approxi.....»»

Category: topSource:  informationweekRelated NewsFeb 28th, 2024

Legato Security Ensemble helps organizations prevent breaches

Legato Security launched Ensemble, a security operations platform that is poised to redefine how organizations detect, manage, and respond to threats. Ensemble empowers organizations to optimize their security investments by unifying threat detection.....»»

Category: securitySource:  netsecurityRelated NewsFeb 27th, 2024

Unmanaged third-party access threatens OT environments

Many industrial organizations lack the resources, expertise, and collaborative processes to effectively mitigate threats and ensure secure access to operational technology (OT) systems, according to Cyolo. Ensuring secure access to OT environments is.....»»

Category: securitySource:  netsecurityRelated NewsFeb 27th, 2024

NetSTAR PhishCompass combats phishing threats

NetSTAR announced an advancement in phish detection technology with the introduction of PhishCompass. This innovative AI-supported solution marks a significant milestone in the ongoing battle against phishing threats and attacks, tailored for a wide.....»»

Category: securitySource:  netsecurityRelated NewsFeb 26th, 2024

Escalating cyber threats spark demand for stronger regulations

As the frequency and sophistication of cyber threats continue to escalate, the need for robust cybersecurity regulations has never been more critical. In this Help Net Security round-up, we present segments from previously recorded videos in which cy.....»»

Category: securitySource:  netsecurityRelated NewsFeb 26th, 2024

It’s time for security operations to ditch Excel

Security teams are hiding an embarrassing secret from the outside world: despite their position at the vanguard of technology, security risks and threats, their actual war plans are managed on spreadsheets. This is a far cry from the dark rooms, mult.....»»

Category: securitySource:  netsecurityRelated NewsFeb 26th, 2024

Secure email gateways struggle to keep pace with sophisticated phishing campaigns

In 2023, malicious email threats bypassing secure email gateways (SEGs) increased by more than 100%, according to Cofense. In just two years, Cofense identified over 1.5 million malicious emails bypassing their customers’ SEGs, signaling a 37% incr.....»»

Category: securitySource:  netsecurityRelated NewsFeb 23rd, 2024

AI threats: US Justice Department appoints AI officer; call for action on deepfakes

There’s growing recognition of the AI threats we may face as companies push further and faster with artificial intelligence tech. Responding to this, the US Justice Department has appointed its first ever federal law enforcement officer focused on.....»»

Category: topSource:  pcmagRelated NewsFeb 22nd, 2024

Apple users are increasingly falling victim to malware, phishing, and viruses

In a report going over the state of malware in 2024, device management firm Jamf says that 9% of mobile users were caught by phishing, while 20% of companies were at risk because of bad smartphone configurations.Jamf logoJamf is a service for compani.....»»

Category: appleSource:  appleinsiderRelated NewsFeb 22nd, 2024