Security News

Understanding and Improving the Burden on Threat Hunters
2021-08-16 12:20

The report seeks to "Track the level of maturity at which analyst teams and threat hunting teams are operating," It defines maturity as the use of threat intelligence, internal threat hunting, and external threat reconnaissance. Most threat hunting teams do some form of external threat reconnaissance; but few do it to the extent recommended by Team Cymru.

Frost & Sullivan names Group-IB a leader in the global cyber threat intelligence market
2021-08-15 00:00

Group-IB has been named one of the leaders in the global cyber threat intelligence market by Frost & Sullivan. According to "Frost Radar: Global Cyber Threat Intelligence Market, 2021," Group-IB with its proprietary Threat Intelligence & Attribution platform is one of the most innovative threat intelligence vendors and the third-largest one, enjoying an over 15-percent share of the global market.

Threat Stack adds context functionality to reduce MTTK within its Cloud Security Platform
2021-08-12 00:45

Threat Stack announced new alert context functionality to reduce mean-time-to-know within the Threat Stack Cloud Security Platform. Threat Stack's enhanced alert context provides meaningful data that will help guide security leaders' investigations into high severity alerts in real-time.

Accenture confirms hack after LockBit ransomware data leak threats
2021-08-11 16:22

Accenture, a global IT consultancy giant has allegedly been hit by a ransomware cyberattack from the LockBit ransomware gang. A ransomware group known as LockBit 2.0 is threatening to publish files data allegedly stolen from Accenture during a recent cyberattack.

A Closer Look at Intel's Hardware-Enabled Threat Detection Push
2021-08-11 10:17

The silicon security parts of Secured-Core PCs are only part of Intel's ongoing hardware security program. As hackers continue to evolve their techniques, moving increasingly towards the hardware infrastructure, Intel argues that organizations of all sizes must invest in better technology - from endpoint to network edge to cloud.

Chinese threat actors have been compromising telecom networks for years, investigation finds
2021-08-10 22:00

Published by Cybereason, the report said that it found evidence of three different clusters of attacks going back to at least 2017, all perpetrated by groups or individuals connected in some way to advanced persistent threat groups Soft Cell, Naikon and Group-3390, which have each operated for the Chinese government in the past. Cybereason said it believes the goal of the attacks was to established continuous access to telecom provider records "And to facilitate cyber espionage by collecting sensitive information, compromising high-profile business assets such as the billing servers that contain Call Detail Record data, as well as key network components such as the Domain Controllers, Web Servers and Microsoft Exchange servers."

NETGEAR Armor offers enhanced security and threat detection for the smart connected home
2021-08-10 13:00

NETGEAR announced more protective NETGEAR Armor capabilities with advanced security and threat detection for the smart connected home. The enhanced NETGEAR Armor built into most Orbi and Nighthawk routers provides a protective bubble for connected devices in a home network, helping consumers stay safe from hackers, malware and viruses.

The challenges healthcare CISOs face in an evolving threat landscape
2021-08-10 06:30

Organizations in the healthcare sector - and especially those engaged in delivering healthcare services - have always been juicy targets for cyber attackers. While in the past they were mostly after patients' personal, health and financial data these organizations store to be able to provide services, the advent of ransomware has dramatically changed the threat landscape they must face.

Behind the scenes: A day in the life of a cybersecurity "threat hunter"
2021-08-09 12:00

Here's how one security operations analyst, an expert at incident reporting, began her career, collaborates with her colleagues and prioritizes incoming threats. Cha attended the National University of Singapore and studied computer science with a focus in cybersecurity, where she learned "The theory behind all of the things we take for granted." She first got a security job in a consulting firm, where she worked in identity and access management, then she worked at a bank, as a security operations center analyst before landing her current job, as a "Threat hunter" at ExpressVPN. SEE: Security incident response policy.

Why ransomware is such a threat to critical infrastructure
2021-08-09 05:30

A recent spike in large-scale ransomware attacks has highlighted the vulnerabilities in the nation's critical infrastructure and the ease with which their systems can be breached. Cyberattacks and ransomware pose a greater risk to critical infrastructure than a non-digital external threat like a nation-state does, and the size and scale of the infrastructure has little to do with the scope of the risk; ransomware is just as much as threat to a water treatment plant in downtown Smallville, USA, as it is to a large-scale energy grid or gasoline pipeline.