Security News

Week in review: Windows RDP backdoor, GDPR enforcement, application threats and security trends
2020-05-31 07:00

Application threats and security trends you need to know aboutApplications are a gateway to valuable data, so it's no wonder they are one of attackers' preferred targets. C-suite execs often pressure IT teams to make security exceptions for themThe C-suite is the most likely group within an organization to ask for relaxed mobile security protocols - despite also being highly targeted by malicious cyberattacks, according to MobileIron.

Splunk users now have access to Sixgill’s Darkfeed, enhancing security and threat protection
2020-05-28 23:30

Sixgill announced that users of Splunk, the Data-for-Everything platform, will have access to Sixgill's Darkfeed, the company's automated stream of indicators of compromise. By leveraging Darkfeed in Splunk's analytics-driven SIEM, enterprises gain contextual and actionable insights in real-time to enhance security and proactively protect against threats.

Allot BusinessSecure: A new solution for CSPs to protect their customers from cybersecurity threats
2020-05-28 02:30

Allot, a leading global provider of innovative network intelligence and security-as-a-service solutions for communication service providers and enterprises, launched Allot BusinessSecure, a new solution that CSPs can offer their SMB and Enterprise customers to protect them from emerging cybersecurity threats, including malware, phishing, ransomware and crypto-mining, while increasing revenue. Allot BusinessSecure is the newest member of the Allot Secure family of unified cybersecurity solutions, the world's leading network-based security as a service solution, used by over 23 million consumer and business subscribers.

Application threats and security trends you need to know about
2020-05-27 11:25

Since modern applications aren't a monolithic whole but consist of many separate components "Glued together" over networks, attackers have at their disposal many "Doors" through which they can attempt access to the data. "Access tier attacks are any that seek to circumvent the legitimate processes of authentication and authorization that we use to control who gets to use an application, and how they can use it. The result of this kind of attack is a malicious actor gaining entry to a system while impersonating a legitimate user. They then use the legitimate user's authorization to accomplish a malicious goal- usually data exfiltration," the analysts explained.

Akamai launches a new in-browser threat detection solution that uncovers compromised scripts
2020-05-27 02:30

Akamai, the intelligent edge platform for securing and delivering digital experiences, announced the launch of Page Integrity Manager, an in-browser threat detection solution designed to uncover compromised scripts that could be used to steal user data or impact the user experience. Initially popularized by Magecart groups, and now being leveraged by other threat actors, the attack vector of malicious web page scripts is growing and has become a frequent source of data breaches.

Appdome joins Microsoft Intelligent Security Association to better defend against increasing threats
2020-05-26 23:30

Appdome, a no-code mobile integration and solutions platform, announced that it has joined the Microsoft Intelligent Security Association, an ecosystem of independent software vendors that have integrated their solutions to better defend against a world of increasing threats. Finally, as part of the Appdome build, organizations can choose to add features from the Appdome Mobile Security Suite, such as App hardening, Man-in-the-Middle protection, and native and non-native code obfuscation to their built apps.

What hinders successful threat hunting?
2020-05-26 04:00

As more organizations implement successful threat hunting operations, a SANS Institute survey finds that they are facing common challenges with employing skilled staff and collecting quality threat intelligence. With the concept of threat hunting being relatively new for many organizations only 29% of respondents consider themselves mature or very mature in their threat hunting, with nearly 68% self-identifying their threat hunting as immature or still maturing.

With the threat landscape continuously changing, businesses must be ready for anything
2020-05-20 05:00

Despite efforts by organizations to layer up their cyber defenses, the threat landscape is changing, attackers are innovating and automating their attacks, NTT reveals. The attack data indicates that 55% of all attacks in 2019 were a combination of web-application and application-specific attacks, up from 32% the year before, while 20% of attacks targeted CMS suites and more than 28% targeted technologies that support websites.

Insider threat? Pffft. Hackers on the outside are the ones mostly making off with your private biz data, says Verizon
2020-05-19 04:01

Outside hackers were to blame for most data thefts last year, while in-house drama contributed to only a fifth of total computer security incidents, Verizon reckons. In its 13th Data Breach Investigations Report, which probed some 4,000 intrusions and network breaches in 2019, Verizon found that the online world is still a fairly bad place if you're not tooled up enough to defend yourself and your customers from external miscreants hoping to make bank.

Insider threat? Pffft. Hackers on the outside are the ones mostly making off with your private biz data, says Verizon
2020-05-19 04:01

Outside hackers were to blame for most data thefts last year, while in-house drama contributed to only a fifth of total computer security incidents, Verizon reckons. In its 13th Data Breach Investigations Report, which probed some 4,000 intrusions and network breaches in 2019, Verizon found that the online world is still a fairly bad place if you're not tooled up enough to defend yourself and your customers from external miscreants hoping to make bank.