Security News

In May 2019, Flashpoint CEO Josh Lefkowitz shared in SecurityWeek tips for evaluating threat intelligence vendors that cover the deep and dark web. I wanted to look at the entire threat intelligence space and provide some thoughts on how to evaluate the best vendors for you.

The advantages of having decent threat intelligence in place are many and various, as the threat landscape continues to widen year-on-year. The problem, as with any complex big-data project, is cutting through the inevitable data deluge to correctly identify the bits you need - the people, places, technology, and other moving parts to build the picture.

Okay, we've had a problem - meet Cato MDR Cato MDR is incorporated into Cato's SASE platform, overcoming the complications of traditional MDR. Cato aims to break the endless cycle of increasing threats and lurking hackers. Automated threat hunting: Cato uses big data and machine learning algorithms to mine the network for suspicious flows, which are based on the many flow attributes available to Cato.

He starts the book by explaining the importance of a cybersecurity strategy and why it should be implemented, but also how security leaders should search for knowledge from the past by using vulnerability disclosure data to help them build their own strategy and avoid making mistakes that others have already made. Only by knowing their variety and frequency it is possible to define an efficient cybersecurity strategy.

Presumably, the fact that the blackmail message was uploaded to your database - proving that the crooks had write access - is meant to convince you that the crooks definitely also had read access and therefore did indeed steal all your data. One thing missing from the blackmail message above is the sort of pressure you'd expect in a ransomware attack, namely that you're paying to get your data back because the crooks have wiped or scrambled it.

The U.S. Federal Communications Commission on Tuesday designated Chinese telecommunications companies Huawei and ZTE as national security threats. By declaring the Chinese companies national security threats, the FCC is banning U.S. organizations from acquiring equipment or services using money from the agency's Universal Service Fund.

A new piece of ransomware dubbed EvilQuest is being delivered bundled up with pirated versions of popular macOS software, researchers warned. The ransomware is also a smokescreen, as its "Noisiness" is meant to hide other things happening on the system in the background: the installation of a keylogger and a reverse shell, and the exfiltration of files that contain valuable information.

SafeGuard Cyber announced the release of new capabilities within its flagship collaboration, chat, and social media security platform. SafeGuard 7.6 now performs threat analysis on managed social and digital accounts to detect and remediate malware, including zero day exploits and associated messaging, file attachments, and links that are shared on these channels.

Threat hunting solutions provider Hunters today announced that it closed a $15 million Series A funding round, which brings the total raised by the company to $20.4 million. The funds will allow Hunters to invest further in machine learning research and extend its threat detection capabilities.

McAfee, the device-to-cloud cybersecurity company, announced general availability of McAfee MVISION Insights, the industry's first proactive security solution that changes the cyber security paradigm by helping to stop threats before the attack. MVISION Insights provides actionable and preemptive threat intelligence by leveraging McAfee's cutting-edge threat research, augmented with sophisticated Artificial intelligence applied to real-time threat telemetry streamed from over 1 billion sensors.