Security News

Group-IB launches new threat hunting and attack prevention solution
2020-11-27 07:59

Group-IB has revealed the results of its yearslong development of proprietary high-tech products for threat hunting and research - Threat Intelligence & Attribution and Threat Hunting Framework. The creation of TI&A marks the emergence of a new type of solutions for collecting data on threats and attackers relevant for a particular organization with the aim of examination and proactive hunting for threat actors, research, and protection of network infrastructure.

Cyber Risk Aware and Blue Cube Security tackle the increasing cyber threat to businesses
2020-11-26 00:00

Cyber Risk Aware announces a new partnership with one of the UK's largest cyber security solutions providers, Blue Cube Security. Cyber Risk Aware and Blue Cube Security have joined forces on a mission to tackle the increasing cyber threat to businesses and organisations in the UK. Over the last year, 98% of security professionals in the UK have reported an increase in cyber-attacks, with 96% revealing more sophisticated methods being used in these attacks.

Chinese Threat Actor 'Mustang Panda' Updates Tools in Attacks on Vatican
2020-11-24 16:09

A Chinese threat actor tracked as Mustang Panda was observed using an updated arsenal of tools in recent attacks, Proofpoint's security researchers revealed on Monday. Also referred to as TA416 and RedDelta, the threat group is known for the targeting of entities connected to the diplomatic relations between the Vatican and the Chinese Communist Party, along with entities in Myanmar, and the new campaign appears to be a continuation of that activity.

Naked Security Live – Beat the Threat!
2020-11-23 19:07

Did you know you can join us for a live cybersecurity lecture every Friday? Thanks for watching hope to see you online later this week!

Choosing the Right Threat Intelligence Mix
2020-11-23 15:49

Whether working within a company that has deployed an advanced intelligence program or in one just getting started, there are steps we can take to ensure we're investing in the right mix of products, services and feeds. Data is the lifeblood of threat intelligence programs, but we can't implement a successful program based on feeds alone.

Workshop Today: Threat Hunting With VirusTotal - Black Belt Edition
2020-11-19 15:12

Threat Hunting is one of the most popular techniques used by security analysts for all kinds of investigations. It is both science and, to some degree, inspiration.

Russia, China 'Cyber Threats' Target Canada: Report
2020-11-19 12:25

State-sponsored programs from China, Russia, Iran and North Korea pose the greatest high-tech threats to Canada, a report from the nation's authority on cyber security warned Wednesday. "The number of cyber threat actors is rising, and they are becoming more sophisticated", the Canadian Centre for Cyber Security said.

A perspective on security threats and trends, from inception to impact
2020-11-19 05:30

Sophos published a report which flags how ransomware and fast-changing attacker behaviors, from advanced to entry level, will shape the threat landscape and IT security in 2021. "Commodity malware can seem like a sandstorm of low-level noise clogging up the security alert system. From what Sophos analyzed, it is clear that defenders need to take these attacks seriously, because of where they might lead.".

Manufacturing industry overwhelmed by innovative threat actors
2020-11-19 05:00

The research findings point to an industry whose security teams are seeing the IT and OT environments converging at a rapid pace. Manufacturing organizations are struggling to safeguard OT assets as they are using the same tools to safeguard their IT infrastructure as they are for OT. As a result, IT teams can't keep up with growing volumes of security data or the increasing number of security alerts.

Flashpoint acquires CRFT to build automation around actionable threat intelligence
2020-11-19 00:00

Flashpoint already produces the industry's highest-quality threat intelligence from online illicit communities. By integrating CRFT's no-code security automation into Flashpoint's product suite, the company is now positioned to empower Cyber Threat Intelligence, Fraud, and Security teams to take rapid, automated action from inbound intelligence and event-based alerts.