Security News
The native integration of Acronis Cyber Protect Cloud with Advanced Email Security means MSPs can use one solution to extend their cyber protection services to protect their clients' Microsoft 365, Google Workspace, Open-Xchange mailboxes, or on-premises mail server. "We are thrilled to partner with Acronis to power the leading Acronis Cyber Protect Cloud solution, with Perception Point, integrated as the Advanced Email Security pack," said Yoram Salinger, CEO of Perception Point.
Maltego Technologies and Farsight Security announced that Farsight DNSDB Transforms for Maltego, first launched in 2018, have now been updated to include DNSDB Flexible Search. Farsight DNSDB, together with Maltego, with its node-based graph, enables threat hunters, incident responders and other investigators to easily identify patterns and connections associated with cybercrime activities, with more accurate threat intelligence and faster response to today's threats.
ITC Secure joins Microsoft Intelligent Security Association to tackle rapidly evolving cyber threats
ITC Secure announced it has joined the Microsoft Intelligent Security Association, an ecosystem of independent software vendors and managed security service providers that have integrated their solutions to better defend against a world of increasing threats. This announcement follows the recent successes of ITC achieving Microsoft Gold Partner competencies for Security in May 2021 and Cloud Platform in November 2020.
FINRA, the U.S. securities industry regulator, has warned brokerage firms of an ongoing phishing campaign threatening recipients with penalties unless they provide the information requested by the attackers. Org domain used in these ongoing phishing attacks was registered on June 7 using the Hosting Concepts B.V. domain registrar.
CISA has partnered with the Homeland Security Systems Engineering and Development Institute, which worked with the MITRE ATT&CK team, to issue guidance to help cyber threat intelligence analysts make better use of MITRE ATT&CK. MITRE ATT&CK is a knowledge base of adversary information widely used by network defenders as they analyze and report on security threats. A solid understanding of how to apply ATT&CK can be used to develop adversary profiles; conduct activity trend analyses; and be incorporated into reporting for detection, response, and mitigation purposes, the document states.
Security and IT professionals in the Middle East are demonstrating a rising desire to secure critical applications and data, driving higher encryption adoption for newer use cases like containers and IoT platforms, as well as for email and private cloud infrastructures. Encryption adoption for private cloud infrastructure is up.
Chinese-backed threat actors breached New York City's Metropolitan Transportation Authority network in April using a Pulse Secure zero-day. MTA mitigated the vulnerability on April 21, one day after Pulse Secure issued an advisory, and CISA published an alert on the Pulse Secure zero-day exploited in the attack.
The U.S. Cybersecurity and Infrastructure Security Agency on Wednesday announced the availability of a new guide for cyber threat intelligence analysts on the use of the MITRE ATT&CK framework. The MITRE ATT&CK knowledge base of adversary tactics and techniques is widely used by security teams, but recent studies cited by CISA showed that many cybersecurity professionals don't use it to its full potential.
More than 90 percent of CISOs rely on outdated, report-based threat intelligence that is often too old to inform decisions, according to Cybersixgill. The survey of 150 CISOs at firms with at least 10,000 employees or $1 billion in revenue was conducted by Global Surveyz in February and March 2021 to foster a better understanding of the state of threat intelligence, and the focus that today's companies are placing on these vital technologies.
Microchip Technology announced it has extended its FPGA family's security with the DesignShield development tool that further helps prevent this information from being extracted for malicious purposes. "As a leader in the security space, Microchip offers a portfolio featuring the latest countermeasures for reducing the risk of cloning, intellectual property theft, reverse engineering, or the insertion of malicious Trojan Horses," said Bruce Weyer, vice president of Microchip's FPGA business unit.