Security News

U.S. Officials Ask Juniper Networks About Investigation Into 2015 Backdoor
2020-06-10 18:42

More than a dozen U.S. officials have sent a letter to California-based networking and cybersecurity solutions provider Juniper Networks to ask the company about the results of the investigation launched in 2015 following the discovery of a backdoor in its products. Dual EC DRBG was known to contain a backdoor introduced by the NSA, which led some to speculate that the NSA may have planted the unauthorized code in Juniper products, while others said it could have been the work of a foreign government.

HYAS Insight: A threat intelligence solution for investigation and attribution
2020-03-19 03:30

HYAS, a leader in threat intelligence and attribution, announced HYAS Insight, a threat intelligence and attribution solution that improves visibility and productivity for analysts, researchers and investigators while vastly increasing the accuracy of their findings. HYAS Insight lets analysts connect specific attack instances and campaigns to billions of historical and real-time indicators of compromise faster than ever before, bringing invaluable new intelligence and visibility to security efforts.

SecBI XDR Platform: Continuous and automated threat detection, investigation and response
2020-02-27 03:30

With cyber criminals using multiple attack vectors to reach their targets, SecBI, a disruptive player in cyber defense, announced the launch of its XDR Platform, designed for continuous and automated threat detection, investigation and response on all attack vectors, with a Fortune 500 company among its first customers. SecBI's newly released XDR platform takes a multi-vector approach, applying a proactive layer of machine learning-based analytics across all endpoint, network, and cloud security tools.

Irish Privacy Report Gives Glimpse Into GDPR Investigations
2020-02-24 19:03

A newly released report offers a glimpse into how European Union authorities are applying the General Data Protection Regulation to some of the biggest U.S. technology firms, including social media giants Facebook and Twitter. What makes Ireland a bellwether for GDPR is that many U.S. technology firms, including Apple, Facebook and Google, have designated Ireland as their "Main establishment" in the EU. Under GDPR, that enables them to qualify for a one-stop-shop mechanism, which ensures that the data protection authority in that country takes the lead on any EU privacy investigations.

Magnet Forensics unveils new solution that simplifies remote forensics investigations
2020-01-29 03:30

Magnet Forensics released Magnet AXIOM Cyber, an innovative new solution purpose-built for organizations that need to perform remote acquisitions as well as collect and analyze evidence from cloud sources, computers and mobile devices. In addition to all the innovative features found in Magnet AXIOM, Magnet Forensics' best-in-class digital forensics solution, AXIOM Cyber enables investigators to remotely collect evidence from target endpoints.

Questions Linger Over Investigation Into Jeff Bezos' Hacking
2020-01-24 19:03

Cybersecurity experts said Thursday there were still many unanswered questions from an investigation commissioned by Jeff Bezos that concluded the billionaire's cellphone was hacked, apparently after receiving a video file with malicious spyware from the WhatsApp account of Saudi Arabia's crown prince. The report further pointed to messages later sent from the prince's WhatsApp account to Bezos that showed "Apparent awareness" of private information.

FireEye Mandiant unveils two new services to help orgs improve detection, investigation, and response
2020-01-22 03:00

FireEye, the intelligence-led security company, announced the availability of two new FireEye Mandiant services. Cloud Security Assessments help organizations evaluate and harden security in cloud platforms, and Cyber Defense Operations consulting services help organizations achieve security transformation by improving the detection and response capabilities of their security operations center.

Network Traffic Analysis Provides Visibility, Detection and Investigation Capabilities
2020-01-07 11:03

In order to shift security postures from reactive to proactive positioning, organizations will need to re-evaluate their security strategy so that they are able to shape the attack surface to their advantage and make network traffic analysis solutions the cornerstone of their detection and response capabilities relied on by SOC teams. First, organizations need to know what their security stack contains - what capabilities are present and utilized, what capabilities are missing, and what capabilities may be duplicative.

Friday Squid Blogging: Streamlined Quick Unfolding Investigation Drone
2019-12-20 22:06

Yet another squid acronym. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here....

Second time lucky: Sweden drops Julian Assange rape investigation
2019-11-19 15:21

US Dept of Justice books one-way plane ticket in his name A rape investigation involving everyone's favourite cupboard-dwelling WikiLeaker, Julian Assange, has been dropped, Swedish prosecutors...