Security News
Instead of relying on customers to protect their vulnerable smart home devices from being used in cyberattacks, Ben-Gurion University of the Negev and National University of Singapore researchers have developed a new method that enables telecommunications and internet service providers to monitor these devices. The researchers developed a method to detect connected, vulnerable IoT models before they are compromised by monitoring the data traffic from each smart home device.
Avast launched Avast Business Small Office Protection, a solution for small businesses that provides robust, real-time cyber protection that's easy to install and cost-effective. Small Office Protection by Avast Business is an all-in-one security solution for small businesses that protects all types of devices, protecting a maximum of 10 separate devices on any platform.
Neal Krawetz, a computer forensics expert, has published details on how to detect Tor bridge network traffic that he characterizes as "Zero-day exploits"... which the Tor Project insists are nothing of the sort. Typically, users slide into the Tor network through a publicly listed entry relay, though they may choose to join via a bridge relay, or bridge for short, to avoid IP-based detection and censorship.
Power companies need help from the US government, cybersecurity experts, and supply chain partners to defend against the increasing security risks to public power grids. Dragos hosted a conversation on Tuesday with the World Economic Forum's Head of Centre for Cybersecurity, William Dixon, and four experts on security and the power industry.
SafeGuard Cyber announced the release of new capabilities within its flagship collaboration, chat, and social media security platform. SafeGuard 7.6 now performs threat analysis on managed social and digital accounts to detect and remediate malware, including zero day exploits and associated messaging, file attachments, and links that are shared on these channels.
If a compromise is not contained within the endpoint, it can rapidly spread to other endpoints and across the network. Segmentation firm Illumio is closing this gap with the release of Illumio Edge - segmentation for the endpoint.
Report on espionage attacks using LinkedIn as a vector for malware, with details and screenshots. They talk about "Several hints suggesting a possible link" to the Lazarus group, but that's by no means definite.
BitDam announced that it is available to small to medium-sized enterprises to provide an additional layer of defense against email-based cyber-attacks. BitDam stops unknown threats, even detecting the 25% of unknown threats that other solutions miss, and patches important security holes in SME email and other collaboration platforms.
Menlo Security announced that the company is partnering with Microsoft to obtain advance vulnerability information through the Microsoft Active Protections Program. MAPP is a program that provides early access to vulnerability information to security software providers so they can provide protections to their customers faster.
Blackpoint Cyber released 365 Defense - a Microsoft 365 security add-on for its true Managed Detection and Response service. With 365 Defense, Blackpoint adds 24/7 monitoring, threat detection, and security policy enforcement for Microsoft 365 environments.