Security News
Whatever unit of measurement you use, it's clear that more and more enterprise computing is happening in the cloud - which also means the cloud is an ever-growing target for cyber attackers. SANS Institute has expanded its line-up of cloud-focused security courses, adding six freshly minted courses, with a seventh one currently in beta testing phase.
CrowdStrike announced a series of integrations with CrowdStrike Security Cloud that correlates the CrowdStrike Falcon platform's enriched endpoint and workload telemetry with network telemetry for greater end-to-end visibility and contextual insights to combat threats. These integrations with leaders in network detection and response and network threat analytics help mutual customers build a cohesive platform tailored to protect and defend against any threats across all enterprise software components, wherever those threats are encountered.
Ermetic announced a new version of the Ermetic platform that continually monitors the access behavior of user and machine identities to detect suspicious activity and prevent security threats. The new capabilities enable organizations to protect against unusual data access, suspicious configuration changes, privilege escalation and more, in multicloud environments.
F5 announced enhancements to its application security portfolio. "To help today's customers succeed, security must be native to applications and APIs, continuous, applied in real time, and powered by data and AI.".
By teaming up with Kasada, GreyNoise Intelligence will be able to provide users with an improved understanding of their security environment and more accurate information about which potential threats demand their attention. GreyNoise has enriched its IP data with Kasada's intelligence on persistent bot traffic, allowing users to quickly identify and triage emerging bot activity.
Organizations in the automotive industry are no stranger to demands and mandates regarding car and passenger safety, so addressing the issue of cybersecurity of computerized, connected vehicles should, in theory, not be a huge problem. "Today's sophisticated connected vehicle architecture is inherently more vulnerable to cyber attacks. Connected vehicles can host up to 150 electronic control units and run on 100 million lines of code; tomorrow's vehicles may contain up to 300 million lines of software code. Cyber attacks that exploit the increasing digitization of vehicles present a significant risk to manufacturers, vehicle owners, other drivers and pedestrians," Meron noted.
N-able announced a collaboration with DNSFilter to integrate its cloud-based security solution with N-able N-central and RMM, providing MSPs with threat protection and content filtering. The new embedded capabilities will help give N-able partners robust protection against these types of threats, including phishing, ransomware, and zero day social engineering attacks.
An unfortunate byproduct of the employee turnover is the cybersecurity threat that comes with having a significant number of former employees. "A lot of companies fail to have clear policies or a checklist that employers use for post-employee separation. This is extremely important because failing to do so is going to involve a lot of things but the most important thing is that you want to make sure that the former employee or even a subcontractor that previously had access to the organization's technologies and systems is completely locked out," Guccione said in an interview.
New DNS vulnerabilities have the potential to impact millions of devicesForescout Research Labs, in partnership with JSOF, disclosed a new set of DNS vulnerabilities, dubbed NAME:WRECK. FBI removes web shells from hacked Microsoft Exchange serversAuthorities have executed a court-authorized operation to copy and remove malicious web shells from hundreds of vulnerable on-premises versions of Microsoft Exchange Server software in the United States. The benefits of cyber threat intelligenceIn this Help Net Security podcast, Maurits Lucas, Director of Intelligence Solutions at Intel 471, discusses the benefits of cyber threat intelligence.
The office of the Director of National Intelligence released its "Annual Threat Assessment of the U.S. Intelligence Community." Cybersecurity is covered on pages 20-21. Cyber threats from nation states and their surrogates will remain acute.