Category: HelpnetSecurity

Truecaller AI Call Scanner detects AI voice clones in real-time
29
May
2024

Truecaller AI Call Scanner detects AI voice clones in real-time

Three seconds! That’s how much of your voice an AI voice synthesizer needs to generate a complete clone of your…

Moonstone Sleet: A new North Korean threat actor
29
May
2024

Moonstone Sleet: A new North Korean threat actor

Microsoft has named yet another state-aligned threat actor: Moonstone Sleet (formerly Storm-1789), which engages in cyberespionage and ransomware attacks to…

How fraudsters stole $37 million from Coinbase Pro users
29
May
2024

How fraudsters stole $37 million from Coinbase Pro users

A convincing phishing page and some over-the-phone social engineering allowed a group of crooks to steal over $37 million from…

GMO GlobalSign introduces Certificate Automation Manager
29
May
2024

GMO GlobalSign introduces Certificate Automation Manager

GMO GlobalSign announced the rebranding of the company’s certificate automation product, Automated Enrollment Gateway (AEG), to Certificate Automation Manager. The…

PoC exploits for critical FortiSIEM command execution flaws released (CVE-2024-23108, CVE-2023-34992)
29
May
2024

PoC exploits for critical FortiSIEM command execution flaws released (CVE-2024-23108, CVE-2023-34992)

Horizon3.ai researches have released proof-of-concept (PoC) exploits for CVE-2024-23108 and CVE-2023-34992, vulnerabilities that allow remote, unauthenticated command execution as root…

Dashlane Nudges reduces the risk of credential theft
29
May
2024

Dashlane Nudges reduces the risk of credential theft

Dashlane unveiled Dashlane Nudges, a new automated tool to empower admins to proactively create a more security-conscious workforce and drive…

RansomLord: Open-source anti-ransomware exploit tool
29
May
2024

RansomLord: Open-source anti-ransomware exploit tool

RansomLord is an open-source tool that automates the creation of PE files, which are used to exploit ransomware pre-encryption. “I…

Avoiding the cybersecurity blame game
29
May
2024

Avoiding the cybersecurity blame game

Cyber risk management has many components. Those who do it well will conduct comprehensive risk assessments, enact well-documented and well-communicated…

Cybersecurity jobs available right now: May 29, 2024
29
May
2024

Cybersecurity jobs available right now: May 29, 2024

Cloud Security Engineer – Secret Clearance Required Constellation West | USA | Remote – View job details As a Cloud…

A closer look at GenAI impact on businesses
29
May
2024

A closer look at GenAI impact on businesses

This article includes excerpts from various reports that provide statistics and insights on GenAI and its impact on businesses. CEOs…

28
May
2024

Adaptive Shield unveils platform enhancements to improve SaaS security

To secure emerging SaaS attack surfaces, Adaptive Shield has extended the capabilities of its SaaS Security Posture Management (SSPM) unified…

How to combat alert fatigue in cybersecurity
28
May
2024

How to combat alert fatigue in cybersecurity

In this Help Net Security interview, Ken Gramley, CEO at Stamus Networks, discusses the primary causes of alert fatigue in…