Security News
The silicon security parts of Secured-Core PCs are only part of Intel's ongoing hardware security program. As hackers continue to evolve their techniques, moving increasingly towards the hardware infrastructure, Intel argues that organizations of all sizes must invest in better technology - from endpoint to network edge to cloud.
Published by Cybereason, the report said that it found evidence of three different clusters of attacks going back to at least 2017, all perpetrated by groups or individuals connected in some way to advanced persistent threat groups Soft Cell, Naikon and Group-3390, which have each operated for the Chinese government in the past. Cybereason said it believes the goal of the attacks was to established continuous access to telecom provider records "And to facilitate cyber espionage by collecting sensitive information, compromising high-profile business assets such as the billing servers that contain Call Detail Record data, as well as key network components such as the Domain Controllers, Web Servers and Microsoft Exchange servers."
NETGEAR announced more protective NETGEAR Armor capabilities with advanced security and threat detection for the smart connected home. The enhanced NETGEAR Armor built into most Orbi and Nighthawk routers provides a protective bubble for connected devices in a home network, helping consumers stay safe from hackers, malware and viruses.
Organizations in the healthcare sector - and especially those engaged in delivering healthcare services - have always been juicy targets for cyber attackers. While in the past they were mostly after patients' personal, health and financial data these organizations store to be able to provide services, the advent of ransomware has dramatically changed the threat landscape they must face.
Here's how one security operations analyst, an expert at incident reporting, began her career, collaborates with her colleagues and prioritizes incoming threats. Cha attended the National University of Singapore and studied computer science with a focus in cybersecurity, where she learned "The theory behind all of the things we take for granted." She first got a security job in a consulting firm, where she worked in identity and access management, then she worked at a bank, as a security operations center analyst before landing her current job, as a "Threat hunter" at ExpressVPN. SEE: Security incident response policy.
A recent spike in large-scale ransomware attacks has highlighted the vulnerabilities in the nation's critical infrastructure and the ease with which their systems can be breached. Cyberattacks and ransomware pose a greater risk to critical infrastructure than a non-digital external threat like a nation-state does, and the size and scale of the infrastructure has little to do with the scope of the risk; ransomware is just as much as threat to a water treatment plant in downtown Smallville, USA, as it is to a large-scale energy grid or gasoline pipeline.
Yesterday, after being banned from the Conti ransomware operation, a Conti affiliate leaked the training material for the ransomware operation on the XSS hacking forum, giving security researchers and defenders an inside look at the tools being used by the group. A new ransomware gang named BlackMatter is purchasing access to corporate networks while claiming to include the best features from the notorious and now-defunct REvil and DarkSide operations.
Yesterday, after being banned from the Conti ransomware operation, a Conti affiliate leaked the training material for the ransomware operation on the XSS hacking forum, giving security researchers and defenders an inside look at the tools being used by the group. A new ransomware gang named BlackMatter is purchasing access to corporate networks while claiming to include the best features from the notorious and now-defunct REvil and DarkSide operations.
Threat detection startup ReversingLabs has raised $56 million in a Series B funding round. The new funding round was led by private equity firm Crosspoint Capital Partners.
VMware released a report which analyzes how cybercriminals are manipulating reality to reshape the modern threat landscape. "Today, we're seeing a nexus between nation-states and cybercriminals continue to rapidly advance the development of increasingly sophisticated and destructive cyberattacks, combined with the broadening of the attack surface as a result of COVID-19," says Tom Kellermann, head of cybersecurity strategy, VMware.