Security News

If a compromise is not contained within the endpoint, it can rapidly spread to other endpoints and across the network. Segmentation firm Illumio is closing this gap with the release of Illumio Edge - segmentation for the endpoint.

Report on espionage attacks using LinkedIn as a vector for malware, with details and screenshots. They talk about "Several hints suggesting a possible link" to the Lazarus group, but that's by no means definite.

BitDam announced that it is available to small to medium-sized enterprises to provide an additional layer of defense against email-based cyber-attacks. BitDam stops unknown threats, even detecting the 25% of unknown threats that other solutions miss, and patches important security holes in SME email and other collaboration platforms.

Menlo Security announced that the company is partnering with Microsoft to obtain advance vulnerability information through the Microsoft Active Protections Program. MAPP is a program that provides early access to vulnerability information to security software providers so they can provide protections to their customers faster.

Blackpoint Cyber released 365 Defense - a Microsoft 365 security add-on for its true Managed Detection and Response service. With 365 Defense, Blackpoint adds 24/7 monitoring, threat detection, and security policy enforcement for Microsoft 365 environments.

AttackIQ announced the launch of AttackIQ Informed Defense, the most significant product release in the company's history. The AttackIQ Informed Defense Architecture enables a transparent and completely manageable attacker kill chain testing methodology.

Client-side web security provider Source Defense this week announced raising $10.5 million in a Series A+ funding round. Founded in 2014, the company provides a website security solution aimed at delivering real-time protection against attacks originating at website supply-chain vendors.

Britain's Ministry of Defence contractor Interserve has been hacked, reportedly leaking the details of up to 100,000 of past and current employees, including payment information and details of their next of kin. The Daily Telegraph reports that up to 100,000 employee details were stolen, dating back across a number of years.

Yesterday, on the 3rd anniversary of the infamous global WannaCry ransomware outbreak for which North Korea was blamed, the U.S. government released information about three new malware strains used by state-sponsored North Korean hackers. Called COPPERHEDGE, TAINTEDSCRIBE, and PEBBLEDASH, the malware variants are capable of remote reconnaissance and exfiltration of sensitive information from target systems, according to a joint advisory released by the Cybersecurity and Infrastructure Security Agency, the Federal Bureau of Investigation, and the Department of Defense.

SecOps teams are learning a valuable lesson: when you can't physically get onsite to make changes and upgrades to security infrastructure, your ability to deal with security threats slows significantly, and cyber defense agility is greatly reduced. With every day that passes during the current pandemic, the lack of cyber defense agility and lack of visibility into what goes on across a network is one of the biggest cybersecurity issues.