Security News

Threat Actors Introduce Unique ‘Newbie’ Hacker Forum
2020-07-16 12:33

A well-known private hacking forum has recently become more inclusive, introducing a new platform to help newbie threat actors flourish and hone their expertise, research has found. "Historically, the only times we have seen exclusive forums lower the parameters for entry are when they have allowed members willing to pay a set fee in order to bypass the application process. The payment enabled the forum to gain more members but was also financially beneficial to the forum. In CryptBB's case, they are using a dedicated subforum to share knowledge and help others for free. They might be doing this for site-traffic metrics, but the intent behind the scheme seems innocent enough and the forum likely feels it is a way to give back and help others to increase their skills/knowledge."

More Countries Waking up to Huawei Threats, US Say
2020-07-16 05:43

A growing number of countries are recognizing the threat to data privacy from using mobile technology from the Chinese giant Huawei, and are likely to shun the company when building out their 5G networks, the top US security advisor said Wednesday. "Each country is going to make their decisions for their own country, but I think there's a growing recognition everywhere that Huawei is a problem," National Security Advisor Robert O'Brien told journalists in Paris.

Cygilant partners with LogPoint to bring SMBs threat monitoring and analysis capabilities
2020-07-14 00:30

"It's essential to comprehensively monitor an organization's critical systems, regardless of the size of the business," said Rob Scott, president and CEO at Cygilant. "Risks are constantly increasing - while financial and staffing resources are decreasing. This is why a solution that teams LogPoint and Cygilant can make a difference."

The Enemy Within: How Insider Threats Are Changing
2020-07-13 13:00

The way forward is a system that can monitor data in real time and even predict threats before they happen, according to Gurucul CEO Saryu Nayyar and COO Craig Cooper, who both recently participated in a Threatpost editorial webinar devoted to how businesses can protect against insider threats. Cooper offers a raft of independent survey data on business attitudes on insider threats as well as attack data; and follows with insights into best practices for addressing the risk, including examples of how one hospital group in Minneapolis, Minn. was able to come up with a game plan to secure Tom Brady's medical records from the tabloids during the ramp-up to the 2018 Super Bowl.

Finding the Right Threat Intelligence Vendors
2020-07-13 11:02

In May 2019, Flashpoint CEO Josh Lefkowitz shared in SecurityWeek tips for evaluating threat intelligence vendors that cover the deep and dark web. I wanted to look at the entire threat intelligence space and provide some thoughts on how to evaluate the best vendors for you.

How to build a cyber threat intelligence program while cutting through the noise
2020-07-09 16:00

The advantages of having decent threat intelligence in place are many and various, as the threat landscape continues to widen year-on-year. The problem, as with any complex big-data project, is cutting through the inevitable data deluge to correctly identify the bits you need - the people, places, technology, and other moving parts to build the picture.

Cato MDR: Managed Threat Detection and Response Made Easy
2020-07-06 07:41

Okay, we've had a problem - meet Cato MDR Cato MDR is incorporated into Cato's SASE platform, overcoming the complications of traditional MDR. Cato aims to break the endless cycle of increasing threats and lurking hackers. Automated threat hunting: Cato uses big data and machine learning algorithms to mine the network for suspicious flows, which are based on the many flow attributes available to Cato.

Review: Cybersecurity Threats, Malware Trends, and Strategies
2020-07-06 03:30

He starts the book by explaining the importance of a cybersecurity strategy and why it should be implemented, but also how security leaders should search for knowledge from the past by using vulnerability disclosure data to help them build their own strategy and avoid making mistakes that others have already made. Only by knowing their variety and frequency it is possible to define an efficient cybersecurity strategy.

MongoDB ransom threats step up from blackmail to full-on wiping
2020-07-02 18:49

Presumably, the fact that the blackmail message was uploaded to your database - proving that the crooks had write access - is meant to convince you that the crooks definitely also had read access and therefore did indeed steal all your data. One thing missing from the blackmail message above is the sort of pressure you'd expect in a ransomware attack, namely that you're paying to get your data back because the crooks have wiped or scrambled it.

Chinese Companies Huawei and ZTE Declared National Security Threats by FCC
2020-07-01 12:33

The U.S. Federal Communications Commission on Tuesday designated Chinese telecommunications companies Huawei and ZTE as national security threats. By declaring the Chinese companies national security threats, the FCC is banning U.S. organizations from acquiring equipment or services using money from the agency's Universal Service Fund.