Security News

Kasada partners with GreyNoise Intelligence to provide potential threats prioritization
2021-04-21 22:30

By teaming up with Kasada, GreyNoise Intelligence will be able to provide users with an improved understanding of their security environment and more accurate information about which potential threats demand their attention. GreyNoise has enriched its IP data with Kasada's intelligence on persistent bot traffic, allowing users to quickly identify and triage emerging bot activity.

Securing vehicles from potential cybersecurity threats
2021-04-21 05:00

Organizations in the automotive industry are no stranger to demands and mandates regarding car and passenger safety, so addressing the issue of cybersecurity of computerized, connected vehicles should, in theory, not be a huge problem. "Today's sophisticated connected vehicle architecture is inherently more vulnerable to cyber attacks. Connected vehicles can host up to 150 electronic control units and run on 100 million lines of code; tomorrow's vehicles may contain up to 300 million lines of software code. Cyber attacks that exploit the increasing digitization of vehicles present a significant risk to manufacturers, vehicle owners, other drivers and pedestrians," Meron noted.

N-able partners with DNSFilter to provide MSPs with threat protection and content filtering
2021-04-20 00:00

N-able announced a collaboration with DNSFilter to integrate its cloud-based security solution with N-able N-central and RMM, providing MSPs with threat protection and content filtering. The new embedded capabilities will help give N-able partners robust protection against these types of threats, including phishing, ransomware, and zero day social engineering attacks.

Concerns grow over digital threats faced from former employees
2021-04-19 13:44

An unfortunate byproduct of the employee turnover is the cybersecurity threat that comes with having a significant number of former employees. "A lot of companies fail to have clear policies or a checklist that employers use for post-employee separation. This is extremely important because failing to do so is going to involve a lot of things but the most important thing is that you want to make sure that the former employee or even a subcontractor that previously had access to the organization's technologies and systems is completely locked out," Guccione said in an interview.

Week in review: New DNS vulnerabilities, benefits of cyber threat intelligence, FBI removes web shells
2021-04-18 07:40

New DNS vulnerabilities have the potential to impact millions of devicesForescout Research Labs, in partnership with JSOF, disclosed a new set of DNS vulnerabilities, dubbed NAME:WRECK. FBI removes web shells from hacked Microsoft Exchange serversAuthorities have executed a court-authorized operation to copy and remove malicious web shells from hundreds of vulnerable on-premises versions of Microsoft Exchange Server software in the United States. The benefits of cyber threat intelligenceIn this Help Net Security podcast, Maurits Lucas, Director of Intelligence Solutions at Intel 471, discusses the benefits of cyber threat intelligence.

DNI’s Annual Threat Assessment
2021-04-15 11:13

The office of the Director of National Intelligence released its "Annual Threat Assessment of the U.S. Intelligence Community." Cybersecurity is covered on pages 20-21. Cyber threats from nation states and their surrogates will remain acute.

Advice for aspiring threat hunters, investigators, and researchers from the old town folk
2021-04-15 04:00

In these new roles, we are struggling to find the top tier of the ever-expanding next generation of threat experts. In career advice calls and meetings with young adults over the past couple of years, I've noticed an unexpected and common pattern emerge with Ivy League fresh grads with cybersecurity degrees, people considering a career transfer with little formal infosec training, and everyone in between.

Flashpoint helps enterprises and govt agencies mitigate fraud and protect against physical and cyber threats
2021-04-14 02:30

Flashpoint announced two new product offerings in the past two weeks: Flashpoint Brand Protection and Flashpoint Card Fraud Mitigation. These two new products from Flashpoint further extend the capabilities that enterprises and government agencies have at their disposal to mitigate fraud and protect against physical and cyber threats anywhere online.

Threat Stack supports AWS Graviton2-based instances through the Threat Stack Cloud Security Platform
2021-04-14 00:45

Threat Stack announced its ability to support AWS Graviton2-based instances through the Threat Stack Cloud Security Platform. The rapid adoption of AWS Graviton2 workloads presents a challenge for security leaders as many of today's legacy tools do not support it.

COVID-Related Threats, PowerShell Attacks Lead Malware Surge
2021-04-13 20:24

Surging numbers of COVID-themed attacks, PowerShell trojans, along with the SolarWinds compromise and the continued spread of Sunburst malware were major contributors to a massive spike in the number of observed attacks in the wild during the last half of 2020, which McAfee's said averaged 588 attacks per minute within its telemetry during Q3 and Q4 of 2020. Researchers observed an average of 648 threats per minute in Q4 in the wild, an increase of 10 percent over the third quarter a continued upward trend from the 40 percent jump compared to Q2 2020, McAfee's latest threat report said.