Security News

AMD Downplays CPU Threat Opening Chips to Data Leak Attacks
2020-03-09 15:41

AMD is seeking to downplay side-channel attacks that can leak potentially sensitive data from its processors released between 2011 and 2019. AMD this weekend said it does not believe these are "New speculation-based attacks" and did not offer any mitigations: "We are aware of a new white paper that claims potential security exploits in AMD CPUs, whereby a malicious actor could manipulate a cache-related feature to potentially transmit user data in an unintended way," said AMD in a Saturday advisory.

AMD Downplays CPU Threat Opening Chips to Data Leak Attacks
2020-03-09 15:41

AMD is seeking to downplay side-channel attacks that can leak potentially sensitive data from its processors released between 2011 and 2019. AMD this weekend said it does not believe these are "New speculation-based attacks" and did not offer any mitigations: "We are aware of a new white paper that claims potential security exploits in AMD CPUs, whereby a malicious actor could manipulate a cache-related feature to potentially transmit user data in an unintended way," said AMD in a Saturday advisory.

Human-Operated Ransomware Is a Growing Threat to Businesses: Microsoft
2020-03-09 15:39

Employing techniques usually associated with nation-state threat actors, human-operated ransomware attacks represent a growing threat to businesses, Microsoft warned last week. REvil, Samas, Bitpaymer, and Ryuk are some of the most infamous human-operated ransomware campaigns, but other prolific threat actors have emerged recently, demonstrating a need for comprehensive defenses that can stop the attacks in their infancy, Microsoft says.

Don't Let Cyber Threats Jeopardize Your Cloud Transformation
2020-03-05 18:48

Even the most forward-looking organizations with the top security experts face risk when transitioning to the cloud. The case study will also explain how a Network Detection and Response Layer could have provided the missing visibility and detection needed to respond to such an incident.

How to gather cyber threat intelligence from dark markets without breaking US law
2020-03-03 13:55

The U.S. Department of Justice's Cybersecurity Unit has released guidelines for organizations that want to gather cyber threat intelligence from dark web forums/markets but, at the same time, want to stay on the right side of the law. The document focuses on "Information security practitioners' cyber threat intelligence-gathering efforts that involve online forums in which computer crimes are discussed and planned and stolen data is bought and sold. It also contemplates situations in which private actors attempt to purchase malware, security vulnerabilities, or their own stolen data-or stolen data belonging to others with the data owners' authorization-in Dark Markets."

CrowdStrike's 2020 Threat Report: Spammers finetune email thread hijacking
2020-03-03 10:00

In its 2020 Global Threat Report, CrowdStrike found that bad actors are disabling endpoint protection and compromising WordPress sites to steal data and credentials. CrowdStrike's eport includes a threat landscape overview, ransomware threat assessment, e-crime trends and activity, and an update on intrusions from Iran, North Korea, China, Russia and other countries.

Security operations and the evolving landscape of threat intelligence
2020-03-03 06:00

In this podcast recorded at RSA Conference 2020, we're joined by the ThreatQuotient team talking about a threat-centric approach to security operations, the evolution of threat intelligence and the issues surrounding it. We are here today with the ThreatQuotient team to talk about all things security operations, the human element of cybersecurity, and the evolving landscape of threat intelligence.

Download Guide — Advanced Threat Protection Beyond the AV
2020-03-03 04:50

The common practice in recent years is to gain extra protection through implementing either EDREPP solutions or Network Traffic Analysis/NDR solutions. A recently published guide, 'Advanced Threat Protection Beyond the AV' is the first resource that not only guides security executives through the pros and cons of each solution type but also outlines a best-practice approach that allows the "Non-Fortune 500" companies to combine the advantages of both approaches - without actually buying both.

Download guide: Advanced Threat Protection Beyond the AV
2020-03-03 04:00

The Advanced Threat Protection Beyond the AV guide guides security executives through the pros and cons of each solution type, and also outlines a best-practice approach that allows companies to combine the advantages of both approaches - without actually buying both. The Advanced Threat Protection Beyond the AV guide dives deep to explain the differences between the endpoint and network-based approaches, specifying the pros and cons of each and leading to the conclusion that the best protection against cyberthreats entails combining the capabilities of both approaches.

A New Approach to Application Threat Detection and Response
2020-03-02 20:04

Sameer Malhotra of TrueFort on Filling XDR Visibility GapsMoving from EDR to XDR creates new visibility gaps for organizations, says Sameer Malhotra of TrueFort, who explains a new approach to...