Security News
Analysts reviewed 13 million security incidents and found that end-of-life versions of Linux distributions were at the biggest risk. Linux now has been around long enough that old versions are causing security problems, according to a new report from Trend Micro.
Phishing can be a profitable business model, and most breaches begin with a phishing email. As detailed in the report, threats ranging from ransomware, credential harvesters to difficult-to-discover but costly Business Email Compromise targeted inboxes, could have resulted in over $354 million in direct losses had they been successful.
Researchers have discovered a Nigerian threat actor trying to turn an organization's employees into insider threats by soliciting them to deploy ransomware for a cut of the ransom profits. "In this latest campaign, the sender tells the employee that if they're able to deploy ransomware on a company computer or Windows server, then they would be paid $1 million in bitcoin, or 40% of the presumed $2.5 million ransom," researchers wrote in a report published Thursday about the campaign.
The report seeks to "Track the level of maturity at which analyst teams and threat hunting teams are operating," It defines maturity as the use of threat intelligence, internal threat hunting, and external threat reconnaissance. Most threat hunting teams do some form of external threat reconnaissance; but few do it to the extent recommended by Team Cymru.
Group-IB has been named one of the leaders in the global cyber threat intelligence market by Frost & Sullivan. According to "Frost Radar: Global Cyber Threat Intelligence Market, 2021," Group-IB with its proprietary Threat Intelligence & Attribution platform is one of the most innovative threat intelligence vendors and the third-largest one, enjoying an over 15-percent share of the global market.
Threat Stack announced new alert context functionality to reduce mean-time-to-know within the Threat Stack Cloud Security Platform. Threat Stack's enhanced alert context provides meaningful data that will help guide security leaders' investigations into high severity alerts in real-time.
Accenture, a global IT consultancy giant has allegedly been hit by a ransomware cyberattack from the LockBit ransomware gang. A ransomware group known as LockBit 2.0 is threatening to publish files data allegedly stolen from Accenture during a recent cyberattack.
The silicon security parts of Secured-Core PCs are only part of Intel's ongoing hardware security program. As hackers continue to evolve their techniques, moving increasingly towards the hardware infrastructure, Intel argues that organizations of all sizes must invest in better technology - from endpoint to network edge to cloud.
Published by Cybereason, the report said that it found evidence of three different clusters of attacks going back to at least 2017, all perpetrated by groups or individuals connected in some way to advanced persistent threat groups Soft Cell, Naikon and Group-3390, which have each operated for the Chinese government in the past. Cybereason said it believes the goal of the attacks was to established continuous access to telecom provider records "And to facilitate cyber espionage by collecting sensitive information, compromising high-profile business assets such as the billing servers that contain Call Detail Record data, as well as key network components such as the Domain Controllers, Web Servers and Microsoft Exchange servers."
NETGEAR announced more protective NETGEAR Armor capabilities with advanced security and threat detection for the smart connected home. The enhanced NETGEAR Armor built into most Orbi and Nighthawk routers provides a protective bubble for connected devices in a home network, helping consumers stay safe from hackers, malware and viruses.