Security News

Government-Focused Cyber Defense Company Toka Raises $25 Million
2020-10-27 11:14

Toka, an Israel-based company that provides intelligence and defense solutions to governments, announced on Tuesday that it has raised $25 million in a Series B funding round. Toka launched in July 2018, when it also announced raising $12.5 million in seed funding.

Attackers finding new ways to exploit and bypass Office 365 defenses
2020-10-26 06:15

Over the six-month period from March to August 2020, over 925,000 malicious emails managed to bypass Office 365 defenses and well-known secure email gateways, an Area 1 Security study reveals. Attackers increasingly use highly sophisticated, targeted campaigns like business email compromise​ to evade traditional email defenses, which are based on already-known threats.

Source Defense’s client-side platform protects online businesses from data-stealing threats
2020-10-23 02:00

Source Defense announced its new offering of Website in Page Protection, as well as product enhancements and performance improvements to the VICE sandboxing technology within the Source Defense Platform. The Source Defense Platform protects online businesses and their customers from automated attacks and client-side threats, and improves operational efficiency.

SlashNext launches on-device AI mobile phishing defense for iOS and Android
2020-10-21 02:00

SlashNext announced the on-device AI mobile phishing defense for iOS and Android with natural language and link-based detection to protect users from the exponential increase in mobile-based SMS phishing attacks. Now SlashNext, customers and partners can benefit from the industry's fastest and most accurate, 2.0 mobile AI phishing defense, protecting users from all forms of phishing across all their communication channels - SMS, email, social networking, gaming, collaboration and search - without compromising user privacy or performance.

Cybersecurity Awareness Month: Train employees to be first line of defense
2020-10-01 13:00

A cybersecurity expert warns that during Cybersecurity Awareness Month it is time for the enterprise to emphasize training that doesn't just keep their employees from putting the business at risk, but "Empowers them to become the organization's first line of defense." Last year's Cybersecurity Awareness Month presented a different set of issues than this year's.

Microsoft releases Digital Defense Report detailing increasingly advanced cyberattacks
2020-09-30 15:12

On Tuesday, Microsoft released its annual Digital Defense Report providing a glimpse of the trends shaping the cybersecurity landscape during the last year. The Digital Defense Report analyzes cybersecurity threats from the second half of 2019 through the first half of 2020.

Your best defense against ransomware: Find the early warning signs
2020-09-23 05:00

FireEye found that there is usually three days of dwell time between these early warning signs and detonation of ransomware. How does a security team find these weak but important early warning signals? Somewhat surprisingly perhaps, the network provides a unique vantage point to spot the pre-encryption activity of ransomware actors such as those behind Maze.

Review: Web Security for Developers: Real Threats, Practical Defense
2020-09-15 03:30

After a short lesson in internet history, the author puts the reader in the shoes of the attacker and explains how simple it is to hack a website, as well as how easy it is to obtain and apply hacking tools. The author proceeds to offer basic knowledge about how the internet, browsers, web servers and programmers work.

Don't be BlindSided: Watch speculative memory probing bypass kernel defenses, give malware root control
2020-09-10 02:59

Some information needs to be leaked from the kernel that reveals the current layout of its components in RAM. If a ROP exploit just guesses the kernel's layout and is wrong, it will trigger a crash, and this can be detected and acted on by an administrator. "Using speculative execution for crash suppression allows the elevation of basic memory write vulnerabilities into powerful speculative probing primitives that leak through microarchitectural side effects," the paper stated.

How Zero Trust and SASE Can Redefine Network Defenses for Remote Workforces
2020-09-07 14:11

Fully aligned with SASE's edge-based security approach, the Zero Trust security construct can be executed using the SASE framework. To understand how SASE is an approach that enables a Zero Trust security model, we'll dig a little deeper into Gartner's vision.