Security News
Unisys has enhanced CloudForte, its integrated, multi-cloud and application optimization platform. "Unisys offers a comprehensive, vendor-agnostic multi- and hybrid-cloud review to streamline their cloud assessment process and understand exactly where they can make informed infrastructure decisions as well as easily improve cloud security and application-migration processes."
More than ever, now is the time to make absolutely sure that your services and devices are using the best protection available to keep data secured and away from unauthorized hands. There are too many services to possibly list, but some of the most commonly targeted ones include email, banking, and shopping sites.
Citrix Web App and API Protection is a new, cloud-delivered service that provides comprehensive security for applications and APIs in multi-cloud environments. "The flexible models for work and multi-cloud application deployment that companies must now support have greatly expanded the attack surface that IT needs to defend," said Mihir Maniar, Vice President of Product Management, Networking, Citrix.
Arista Networks announced several additions to its multi-cloud and cloud-native software product family with CloudEOS Edge: designed to integrate with native cloud networking services like Amazon Web Services Transit Gateway, enabling cost-effective and high-scale multi-cloud routing services for enterprise IT organizations and production services. Enterprise customers are provisioning, connecting and monitoring their entire multi-cloud networking environment including on-premises private cloud, remote cloud-connected sites and public cloud infrastructures in Amazon Web Services, Microsoft Azure, Google Cloud Platform with CloudEOS and Arista CloudVision.
Qualys today announced Qualys Multi-Vector EDR. Taking a new multi-vector approach to Endpoint Detection and Response, Qualys now brings the unifying power of its highly scalable cloud platform to EDR. Traditional EDR solutions singularly focus on endpoints' malicious activities to hunt and investigate cyberattacks. Multi-Vector EDR enables security teams to unify multiple context vectors like asset and software inventory, end-of-life visibility, vulnerabilities and exploits, misconfigurations, network traffic summary, MITRE ATT&CK tactics and techniques, malware, endpoint telemetry, and network reachability by leveraging the Qualys backend to correlate with threat intelligence for accurate detection, investigation and response - ALL, in a single, cloud-based app with a single lightweight agent.
Kaspersky's security researchers have identified a multi-platform malware framework that they believe North Korea-linked hackers have been leveraging in attacks over the past couple of years. Called MATA, the platform appears to have been in use since spring 2018 to target computers running Windows, Linux, and macOS. The framework, which consists of components such as a loader, an orchestrator, and plugins, is believed to be linked to the prolific North Korean hacking group Lazarus.
Lazarus Group, the notorious hacking group with ties to the North Korean regime, has unleashed a new multi-platform malware framework with an aim to infiltrate corporate entities around the world, steal customer databases, and distribute ransomware. Capable of targeting Windows, Linux, and macOS operating systems, the MATA malware framework - so-called because of the authors' reference to the infrastructure as "MataNet" - comes with a wide range of features designed to carry out a variety of malicious activities on infected machines.
Lazarus Group, the notorious hacking group with ties to the North Korean regime, has unleashed a new multi-platform malware framework with an aim to infiltrate corporate entities around the world, steal customer databases, and distribute ransomware. Capable of targeting Windows, Linux, and macOS operating systems, the MATA malware framework - so-called because of the authors' reference to the infrastructure as "MataNet" - comes with a wide range of features designed to carry out a variety of malicious activities on infected machines.
EfficientIP launched Cloud IPAM Sync, a new service that enables IT managers to improve control over applications hosted in multi-cloud environments. Cloud IPAM Sync uses DDI to provide central visibility and unified management over internal and cloud datacenters, thanks to real-time repository information.
A recently discovered multi-platform Java ransomware uses a Java image file to evade detection, BlackBerry security researchers report. After establishing a foothold onto the environment, the attackers executed the Java ransomware module, which encrypted all file servers connected to the network, including backup systems.