Security News
Extending the observability provided by the Threat Stack Cloud Security Platform to AWS Fargate tasks can help Threat Stack customers detect threats and maintain compliance across all areas of their cloud infrastructure. The Threat Stack Cloud Security Platform collects and correlates security telemetry from the cloud management console, host, containers, orchestration, managed container services and applications, giving Threat Stack customers a view into their entire cloud environment.
Mimecast released the Threat Intelligence Report: Black Hat U.S.A. Edition 2020, which presents insights gleaned from the analysis of 195 billion emails processed by Mimecast for its customers from January through June 2020. The majority of attacks seen by Mimecast during this period were simple, high volume forms of attacks, such as spam and phishing that is likely a reflection of the ease of access to tools and kits available online.
Security firm recommends digital distancing for devices and more collaboration between IT and security teams to harden the attack surface. A survey of security professionals finds that hackers are getting more aggressive as IT and security teams continue their internal turf battles.
A report released Monday by network monitoring provider Gigamon looks at the use of mobile devices on business networks and the risks posed by mobile malware and inadequate security. The report also offers several pieces of advice on protecting your organization from mobile threats.
Intelligence officials confirmed in recent days that foreign actors are actively seeking to compromise the private communications of "U.S. political campaigns, candidates and other political targets" while working to compromise the nation's election infrastructure. Because of such secrecy, at least in part, foreign interference largely remains an afterthought in the 2020 contest, even as Republicans and Democrats alike concede it poses a serious threat that could fundamentally reshape the election at any moment.
Find out this week: How to build a cyber threat intelligence program while cutting through the noise
The advantages of having decent threat intelligence in place are many and various, as the threat landscape continues to widen year-on-year. The problem, as with any complex big-data project, is cutting through the inevitable data deluge to correctly identify the bits you need - the people, places, technology, and other moving parts to build the picture.
SophosLabs has just published a new report on a ransomware strain known as ProLock, which is interesting not so much for its implementation as for its evolution. Most ransomware scrambles the whole file, so monitoring access to the start of each file is an efficient way of spotting some, but not all, unauthorised changes.
McAfee introduced MITRE ATT&CK into McAfee MVISION Cloud, the company's Cloud Access Security Broker, delivering a precise method to hunt, detect and stop cyberattacks on cloud services. This new integration gives SecOps teams a direct source of cloud vulnerabilities and threats mapped to the tactics and techniques of ATT&CK. McAfee is the first CASB provider to tag and visualize cloud security events within an ATT&CK. "Many SecOps teams leverage repeatable processes and frameworks such as ATT&CK to mitigate risk and respond to threats to their endpoints and networks, but so far cloud threats and vulnerabilities have presented an unfamiliar paradigm," said Rajiv Gupta, senior vice president and general manager of Cloud Security, McAfee.
Isolation technology allows companies to keep employee browsers siloed in the cloud. To deal with this deluge of new threats, dozens of the world's biggest organizations are turning to isolation technologies and techniques to protect employees from the kind of common mistakes cybercriminals are increasingly taking advantage of.
A new study incorporates analysis of anonymized data from more than 5 million unmanaged, IoT, and IoMT devices in Ordr customer deployments across a variety of verticals including healthcare, life sciences, retail and manufacturing, between June 2019 and June 2020. "In some of my recent research around enterprise IoT security I've found that more than 51 percent of IT teams are unaware of what types of devices are touching their network," said Zeus Kerravala, Principal Analyst, ZK Research.