Security News

Cynet changes the rules of the game with a free threat assessment offering based on more than 72 hours of data collection, enabling organizations to benchmark their security posture against their vertical industry peers and take actions accordingly. Cynet Free Threat Assessment spotlights critical, exposed attack surfaces and provides actionable knowledge of attacks that are currently alive and active in the environment.

Cynet changes the rules of the game with a free threat assessment offering based on more than 72 hours of data collection, enabling organizations to benchmark their security posture against their industry vertical peers and take actions accordingly. Cynet Free Threat Assessment spotlights critical, exposed attack surfaces and provides actionable knowledge of attacks that are currently alive and active in the environment.

Gurucul, a leader in unified security and risk analytics technology for on-premises and the cloud, announced the Gurucul Risk Analytics platform has added and aligned machine learning models to detect and enable automated responses to adversarial tactics and techniques defined by the MITRE ATT&CK Framework. "Gurucul customers using the MITRE ATT&CK Framework confirmed that these new advanced behavior models have been able to detect unknown threats associated with high risk third parties including customers, partners and contractors, that evaded signature-based approaches," said Nilesh Dherange, CTO of Gurucul.

Cyber-threat intelligence company Sixgill this week announced the closing of a $15 million funding round. The new funding, Sixgill says, will be invested in expanding its global operations and strengthening core products to support its growing portfolio.

Agari's Cyber Intelligence Division, which concentrates on email threat investigations, has found that 60% of employee-reported suspect emails are false positives. Wire transfer scams also increased from 19% to 22%, while payroll diversion scams fell from around 25% to 16%. There is another shift within the fraudulent emails.

60% of initial entries into victims' networks leveraged either previously stolen credentials or known software vulnerabilities, allowing attackers to rely less on deception to gain access, according to a new IBM report exploring the global threat landscape. "The amount of exposed records that we're seeing today means that cybercriminals are getting their hands on more keys to our homes and businesses. Attackers won't need to invest time to devise sophisticated ways into a business; they can deploy their attacks simply by using known entities, such as logging in with stolen credentials," said Wendi Whitmore, Vice President, IBM X-Force Threat Intelligence.

Elastic, creators of Elasticsearch, announced the release of Elastic Security 7.6.0, which builds on the strengths of Elastic Endpoint Security and Elastic SIEM to deliver unparalleled visibility and threat protection through a unified interface. Elastic Security 7.6 introduces a new SIEM detection engine to automate threat detection, minimizing mean time to detect and freeing up your security team for security tasks requiring human intuition and skill.

The updates provide customers with an enhanced RSA NetWitness UEBA offering that leverages network meta data to accurately identify unknown threats. With the latest edition of the RSA NetWitness Platform, organizations can leverage machine learning to minimize blind spots in the threat landscape and accurately identify true threats, while simultaneously improving incident response planning, management, and orchestration.

GreatHorn, the leading cloud email security provider focused on managing risk from advanced email threats, achieved substantial product innovation, customer growth, and expansion during 2019 with improvements to its industry-leading adaptive threat detection, user protection, and incident response capabilities. With a focus on increasing visibility and control of an organization's email security environment, these enhancements to GreatHorn's flagship product improve threat identification, reduce user engagement with suspicious email, and automate post-delivery remediation.

Almost a third of internet users affected by data breaches last year had reused a password in some form. "Our data shows that consumers are still not changing their poor password habits, yet we know they're holding organizations accountable for their security." said David Endler, chief product officer for SpyCloud.