Security News

Threat Stack Cloud Security Platform extends security observability to AWS Fargate tasks
2020-08-04 23:45

Extending the observability provided by the Threat Stack Cloud Security Platform to AWS Fargate tasks can help Threat Stack customers detect threats and maintain compliance across all areas of their cloud infrastructure. The Threat Stack Cloud Security Platform collects and correlates security telemetry from the cloud management console, host, containers, orchestration, managed container services and applications, giving Threat Stack customers a view into their entire cloud environment.

Analysis of 92 billion rejected emails uncovers threat actors’ motivations
2020-08-04 09:30

Mimecast released the Threat Intelligence Report: Black Hat U.S.A. Edition 2020, which presents insights gleaned from the analysis of 195 billion emails processed by Mimecast for its customers from January through June 2020. The majority of attacks seen by Mimecast during this period were simple, high volume forms of attacks, such as spam and phishing that is likely a reflection of the ease of access to tools and kits available online.

VMware Carbon Black Threat Report finds hackers using more aggressive and destructive tactics
2020-08-04 09:00

Security firm recommends digital distancing for devices and more collaboration between IT and security teams to harden the attack surface. A survey of security professionals finds that hackers are getting more aggressive as IT and security teams continue their internal turf battles.

How to better protect your organization against mobile threats
2020-08-03 15:08

A report released Monday by network monitoring provider Gigamon looks at the use of mobile devices on business networks and the risks posed by mobile malware and inadequate security. The report also offers several pieces of advice on protecting your organization from mobile threats.

Foreign Threats Loom Ahead of US Presidential Election
2020-08-03 11:50

Intelligence officials confirmed in recent days that foreign actors are actively seeking to compromise the private communications of "U.S. political campaigns, candidates and other political targets" while working to compromise the nation's election infrastructure. Because of such secrecy, at least in part, foreign interference largely remains an afterthought in the 2020 contest, even as Republicans and Democrats alike concede it poses a serious threat that could fundamentally reshape the election at any moment.

Find out this week: How to build a cyber threat intelligence program while cutting through the noise
2020-07-28 10:00

The advantages of having decent threat intelligence in place are many and various, as the threat landscape continues to widen year-on-year. The problem, as with any complex big-data project, is cutting through the inevitable data deluge to correctly identify the bits you need - the people, places, technology, and other moving parts to build the picture.

ProLock ransomware – new report reveals the evolution of a threat
2020-07-27 18:27

SophosLabs has just published a new report on a ransomware strain known as ProLock, which is interesting not so much for its implementation as for its evolution. Most ransomware scrambles the whole file, so monitoring access to the start of each file is an efficient way of spotting some, but not all, unauthorised changes.

2020-07-27 04:05

McAfee introduced MITRE ATT&CK into McAfee MVISION Cloud, the company's Cloud Access Security Broker, delivering a precise method to hunt, detect and stop cyberattacks on cloud services. This new integration gives SecOps teams a direct source of cloud vulnerabilities and threats mapped to the tactics and techniques of ATT&CK. McAfee is the first CASB provider to tag and visualize cloud security events within an ATT&CK. "Many SecOps teams leverage repeatable processes and frameworks such as ATT&CK to mitigate risk and respond to threats to their endpoints and networks, but so far cloud threats and vulnerabilities have presented an unfamiliar paradigm," said Rajiv Gupta, senior vice president and general manager of Cloud Security, McAfee.

Companies turning to isolation technology to protect against the internet's biggest threats
2020-07-24 14:49

Isolation technology allows companies to keep employee browsers siloed in the cloud. To deal with this deluge of new threats, dozens of the world's biggest organizations are turning to isolation technologies and techniques to protect employees from the kind of common mistakes cybercriminals are increasingly taking advantage of.

Threat highlight: Analysis of 5+ million unmanaged, IoT, and IoMT devices
2020-07-24 04:30

A new study incorporates analysis of anonymized data from more than 5 million unmanaged, IoT, and IoMT devices in Ordr customer deployments across a variety of verticals including healthcare, life sciences, retail and manufacturing, between June 2019 and June 2020. "In some of my recent research around enterprise IoT security I've found that more than 51 percent of IT teams are unaware of what types of devices are touching their network," said Zeus Kerravala, Principal Analyst, ZK Research.