Help Net Security
Correlate real-time data from mobile devices across the enterprise
OptioLabs announced the availability of OptioInsight for enterprises using OptioCore-secured devices. OptioInsight correlates real-time data from mobile devices across the …
Utilize any data source to see attacks on the inside
Niara, a provider of security analytics for attack detection and incident response, announced that the latest release of its security analytics platform analyzes any data …
Siemplify brings military intelligence capabilities to enterprise security operations
Transforming the way enterprises perform cyberthreat analysis, Siemplify emerged from stealth mode with the first security operations platform to employ the same cybersecurity …
Vera secures $17 million in series B financing
Vera, a top 10 finalist for the Innovation Sandbox competition at RSA Conference 2016, has closed $17 million in Series B financing, led by Sutter Hill Ventures, with …
Hacking hospitals: Cyber attacks can result in physical harm
Independent Security Evaluators (ISE) published a study that demonstrates security flaws to be pervasive within the healthcare industry. The research found that adversaries …
Mastercard’s Selfie ID: Playing Russian Roulette with consumer identities?
At this week’s Mobile World Congress in Barcelona, MasterCard announced it will accept selfie photographs and fingerprints as an alternative to passwords when verifying …
MouseJack: Remote exploitation via radio frequencies
Bastille has uncovered a massive vulnerability in wireless mice and keyboards that leaves billions of PC’s and millions of networks vulnerable to remote exploitation via radio …
Japanese critical infrastructure under targeted attack
Cylance revealed a multi-year, multi-attack campaign against the Japanese critical infrastructure. Their research uncovers how a well-organized and well-funded threat group, …
Attacker View exposes hidden cyber attack paths
Illusive networks launched illusive 3.0 with Attacker View, a technology that enables IT security professionals to view their corporate network from an attacker’s …
Mobile banking Trojan bypasses Google Play security
The Acecard malware is capable of attacking users of nearly 50 different online financial applications and services and is able to bypass Google Play store security measures, …
Perceptions and buying practices of infosec decision makers
CyberEdge Group surveyed 1,000 IT infosec decision makers and practitioners from 10 countries, five continents, and 19 industries, and unsurprisingly, the news is not good. In …
Most businesses are considering or implementing IoT
The Internet of Things (IoT) is growing at an exponential rate. By 2020, some 50 billion devices will connect to the Internet and the economic value created by IoT could be …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring