Security News
Neustar, a global information services company and leader in identity resolution, announced the release of UltraThreat Feeds, a new service that provides its enterprise customers with access to real-time threat data to help them better identify cyber threats as they evolve. Designed by Neustar's renowned security experts and leading academic researchers, the service - unique to Neustar - enables security and threat intelligence teams of all sizes to access threat feeds based on analysis and observations curated from Neustar's expansive DNS, OneID and IP decisioning data.
As public cloud providers continue to elevate their platforms' default enterprise protection and compliance capabilities to close gaps in their portfolio or suites of in-house integrated security products, CISOs are increasingly looking to the use and integration of threat intelligence as the next differentiator within cloud security platforms. Whether thinking in terms of proactive or retroactive security, the incorporation of timely and trusted threat intelligence has been a core tenant of information security strategy for multiple decades - and is finally undergoing its own transformation for the cloud.
Cyber threat intelligence has been a growing part of the cybersecurity industry for the past several years. Let's consider the term "Cyber threat intelligence." "Cyber" limits us to the digital realm, yet our teams are built on intelligence principles that are equally applicable in the physical world.
Zimperium, the global leader in mobile threat defense, announced it has integrated with Microsoft Defender Advanced Threat Protection endpoint detection and response. Advanced threat forensics - Microsoft Defender ATP now has threat forensics including attacker IP/MAC, WiFi network details, malicious processes and apps, and reasons for device compromise or jailbreak;.
An increasing number of threat groups have been spotted targeting electric utilities in North America, industrial cybersecurity firm Dragos reported on Thursday. "As adversaries and their sponsors invest more effort and money into obtaining effects-focused capabilities, the risk of a disruptive or destructive attack on the electric sector significantly increases," the firm said in its report, titled North American Electric Cyber Threat Perspective.
Update] Pre-installed malware on Android phones is a growing menace - so much that on Wednesday this week, Privacy International and around 50 other international NGOs sent an open letter to Google demanding a stop to the habit. The pre-installed malware comprises a Wireless Update app detected by Malwarebytes as Android/PUP.Riskware.
For security professionals, it's another year of playing catch up to the bad guys. Organizations can see the threats they face through logs and alerts, but that doesn't mean they have clarity.
MobileIron announced that its FedRAMP Authorized MobileIron Cloud offering now includes MobileIron Threat Defense. This means federal agencies can build upon MobileIron Cloud with MTD for mobile threat detection and remediation.
To take advantage of emerging trends in both technology and cyberspace, businesses need to manage risks in ways beyond those traditionally handled by the information security function.
Cybersecurity experts believe Iran will likely also respond with cyberattacks to the recent U.S. airstrike that killed senior Iranian military commander Qassem Soleimani, and while many doubt that Iran has the capability to cause significant damage if these attacks are aimed at critical infrastructure or industrial control systems, organizations have still been advised to prepare for the possibility of being targeted. Iran has responded to Soleimani's killing by firing ballistic missiles at two Iraqi bases housing U.S. troop, but Tehran could take other actions as well, including in cyberspace.