Security News

ZeroFox released an advanced external threat hunting capabilities within the ZeroFox platform, designed to provide real-time threat intelligence to threat hunters, analysts and cyber responders. The enhanced threat hunting module delivers a complete global view of active and historical threat intelligence data to understand risks across physical and cyber domains, including social media as well as the surface, deep and dark web.

Threat Stack announced it has expanded its AWS Fargate Security Monitoring to include Amazon Elastic Kubernetes Service. Using the Threat Stack Cloud Security Platform, businesses can gain full-stack observability into AWS EKS on AWS Fargate within minutes to detect threats and maintain compliance throughout their cloud infrastructure.

Netskope revealed new research showing the continued growth of malware delivered by cloud applications and also the potential for critical data exfiltration tied to employees departing their jobs, among a range of increasing cloud application security risks. The findings are part of the July 2021 Netskope Cloud and Threat Report, the latest installment of Netskope Threat Labs' biannual research analyzing critical trends in enterprise cloud service and app use, web and cloud-enabled threats, and cloud data migrations and transfers.

Developing various data sets for threat hunting engagements will further mature your program and help uncover the unknown. Results-driven threat hunting is fast becoming a necessity rather than a "Nice to have." Establishing a threat hunting program from the ground up can feel like a daunting task initially - especially if you work in an organization with limited resources.

This is precisely what you'll get at SANS DFIR Europe 2021, which takes place in Berlin between October 4 and 9, 2021 - and right now, the plan is that all courses will be conducted in person. The nine strong course line-up takes you right from the fundamentals of DFIR, through to specialist and advanced courses, all with highly experienced instructors.

Blue Hexagon announced the native integration of Blue Hexagon's real-time deep learning based threat detection with AWS Network Firewall for real-time protection. As a cloud security platform, for actionable visibility, real-time threat defense and continuous compliance, this integration underscores Blue Hexagon's commitment to delivering innovative solutions to the AWS customers who need to secure their data, network and workloads in the cloud.

IMS Digital Ventures announced the closing of a US$ 1.5M pre-seed round of OwlGaze in which it acted as the lead investor. OwlGaze offers companies an end-to-end predictive threat detection solution to identify, prioritise and prevent cyber attacks using advanced correlation and AI technology.

The growing practice of connecting ICS to enterprise networks and the internet, driven by technologies such as IoT, edge computing and analytics platforms, has put ICS on the radar of cybercriminals. Securing ICS is more challenging than protecting traditional IT environments since ICS is insecure by design.

Flashpoint announces a partnership with the Australian threat intelligence services provider Cybermerc. The partnership features a joint solution making Flashpoint's advanced threat intelligence available in Cybermerc service offerings and acts as a valuable enrichment source fused into Cybermerc Aushield Defend-Australia's chosen national threat investigation and sharing platform.

Threat actors are abusing Argo Workflows to target Kubernetes deployments and deploy crypto-miners, according to a warning from security vendor Intezer. An open-source, container-native workflow engine that runs on Kubernetes, Argo Workflows allows users to run parallel jobs at ease from a central interface, reducing deployment complexity and leaving less room for errors.