Security News

EclecticIQ Platform delivers threat intelligence, hunting, and response capabilities
2021-06-26 02:00

The new open and extensible platform, built on the company's threat intelligence solution, delivers endpoint detection and response functionality, curated intelligence feeds, threat hunting and collaboration capabilities. EclecticIQ Platform is designed to help customers stay ahead of the rapidly changing threat landscape and vastly expanded attack surface and to alleviate staffing shortages by running cyber threat intelligence and security operations more efficiently.

How SMBs are dealing with emerging threats
2021-06-25 05:00

ECI Software Solutions released a report detailing the findings from a survey examining how SMBs are leveraging technology to respond to the various threats from the past year - including cybercrime - while laying the groundwork for not only a post-pandemic economy but a more secure, resilient future. Cybercrime as one of the top five threats SMBs face.

The impact of current and emerging threats on the day-to-day lives of SecOps teams
2021-06-25 04:00

More than half of IT and cybersecurity professionals noted ransomware or zero-day attacks as the biggest threats to their organization, according to a Deep Instinct survey. The report highlights current and emerging threats, the impact these have on the day-to-day lives of SecOps professionals, and how automation will play a significant role moving forward.

Threat Monitoring Firm FYEO Announces Acquisition as It Emerges From Stealth
2021-06-24 12:39

Threat monitoring and identity access management provider FYEO on Wednesday announced that it emerged from stealth mode with the acquisition of threat intelligence company Intelliagg. The company's FEYO DI platform provides end-to-end protection and insights, advanced threat management, domain and credential monitoring, and reporting and benchmarking capabilities.

Combatting OpSec threats to our COVID-19 vaccination efforts: What can we do?
2021-06-24 05:30

In this one, we'll dive into operations security threats to the supply chain. How are people threatening the vaccine supply chain?

MITRE D3FEND: Enabling cybersecurity pros to tailor defenses against specific cyber threats
2021-06-24 04:30

D3FEND, a framework for cybersecurity professionals to tailor defenses against specific cyber threats is now available through MITRE. NSA funded MITRE's research for D3FEND to improve the cybersecurity of National Security Systems, the Department of Defense, and the Defense Industrial Base. The D3FEND technical knowledge base of defensive countermeasures for common offensive techniques is complementary to MITRE's ATT&CK, a knowledge base of cyber adversary behavior.

Securonix Open XDR offers threat detection and response across endpoints, networks and the cloud
2021-06-23 09:43

Securonix announced a new product for its cloud-native platform: Securonix Open XDR. The new product comes with Securonix Autonomous Threat Sweep and empowers customers with robust threat detection and response capabilities needed to respond swiftly to sophisticated threats across endpoints, networks and hybrid cloud environments. The fully integrated solution delivers out-of-the-box threat detection and response across endpoints, networks and the cloud for rapid time to value.

Russia bans Opera VPN and VyprVPN, classifies them as threats
2021-06-18 15:37

Roskomnadzor, Russia's telecommunications watchdog, has banned the use of Opera VPN and VyprVPN after classifying them as threats according to current Russian law. "In accordance with the regulation on responding to threats to circumvent restrictions on access to child pornography, suicidal, pro-narcotic and other prohibited content, restrictions on the use of VPN services VyprVPN and Opera VPN will be introduced from June 17, 2021," the Roskomnadzor said.

Insider Versus Outsider: Navigating Top Data Loss Threats
2021-06-18 13:39

What's shocking is that despite the many advantages cloud and software-as-a-service applications provide organizations, they frequently fall short when it comes to averting data loss. Whether from human error, malicious actors, outages, or other methods, data loss poses a very real risk to the resilience of a business.

Threat Actors Use Google Docs to Host Phishing Attacks
2021-06-17 13:00

Threat actors are exploiting Google Docs by hosting their attacks within the web-based document service in a new phishing campaign that delivers malicious links aimed at stealing victims' credentials. The attack begins with an email that includes a message that could be relevant to business users who commonly use Google Docs within their corporate environment.