Security News

Advice for aspiring threat hunters, investigators, and researchers from the old town folk
2021-04-15 04:00

In these new roles, we are struggling to find the top tier of the ever-expanding next generation of threat experts. In career advice calls and meetings with young adults over the past couple of years, I've noticed an unexpected and common pattern emerge with Ivy League fresh grads with cybersecurity degrees, people considering a career transfer with little formal infosec training, and everyone in between.

Flashpoint helps enterprises and govt agencies mitigate fraud and protect against physical and cyber threats
2021-04-14 02:30

Flashpoint announced two new product offerings in the past two weeks: Flashpoint Brand Protection and Flashpoint Card Fraud Mitigation. These two new products from Flashpoint further extend the capabilities that enterprises and government agencies have at their disposal to mitigate fraud and protect against physical and cyber threats anywhere online.

Threat Stack supports AWS Graviton2-based instances through the Threat Stack Cloud Security Platform
2021-04-14 00:45

Threat Stack announced its ability to support AWS Graviton2-based instances through the Threat Stack Cloud Security Platform. The rapid adoption of AWS Graviton2 workloads presents a challenge for security leaders as many of today's legacy tools do not support it.

COVID-Related Threats, PowerShell Attacks Lead Malware Surge
2021-04-13 20:24

Surging numbers of COVID-themed attacks, PowerShell trojans, along with the SolarWinds compromise and the continued spread of Sunburst malware were major contributors to a massive spike in the number of observed attacks in the wild during the last half of 2020, which McAfee's said averaged 588 attacks per minute within its telemetry during Q3 and Q4 of 2020. Researchers observed an average of 648 threats per minute in Q4 in the wild, an increase of 10 percent over the third quarter a continued upward trend from the 40 percent jump compared to Q2 2020, McAfee's latest threat report said.

How open source security flaws pose a threat to organizations
2021-04-13 16:09

How do such products fare on security? Though the community-based approach toward open source means that security flaws should be identified quickly, patching those flaws and applying the patches is another matter. In a report released Tuesday, design automation company Synopsys looked at commercial applications that use open source code to see how they dealt with security flaws.

The benefits of cyber threat intelligence
2021-04-12 04:30

In this Help Net Security podcast, Maurits Lucas, Director of Intelligence Solutions at Intel 471, discusses the benefits of cyber threat intelligence. You need to plan and invest both time and resources well ahead of time to make sure you're at the right position at the right time to collect intelligence.

Attackers deliver legal threats, IcedID malware via contact forms
2021-04-09 17:55

Threat actors are using legitimate corporate contact forms to send phishing emails that threaten enterprise targets with lawsuits and attempt to infect them with the IcedID info-stealing malware. IcedID is a modular banking trojan first spotted in 2017 and updated to also deploy second-stage malware payloads, including Trickbot, Qakbot, and Ryuk ransomware.

Cybersecurity threats and cybercrime trends of 2020
2021-04-09 04:30

Bitdefender released a report revealing top cybersecurity threats, frequency of threats and cybercrime trends of 2020. "Our 2020 findings depict consumers under constant assault from cybercriminals looking to capitalize on fear and societal uncertainty accompanying the global pandemic," said Bogdan Botezatu, director of threat research and reporting at Bitdefender.

Threat Stack partners with Liquid Web to extend the Threat Stack Oversight IDS to customers
2021-04-07 23:30

As part of this partnership, Liquid Web customers can employ the Threat Stack Oversight Intrusion Detection System as an additional layer of security to Liquid Web servers with an advanced Intrusion Detection System. Together, Threat Stack Oversight and Liquid Web will provide customers with real-time monitoring for user, process, network, and file behaviors in critical systems across Linux and Windows servers.

SAP partners with Onapsis to mitigate active threats against unprotected SAP applications
2021-04-07 23:15

SAP and Onapsis jointly released a cyber threat intelligence report providing actionable information on how malicious threat actors are targeting and potentially exploiting unprotected mission-critical SAP applications. Both companies note that many organizations still have not applied relevant mitigations that have long been provided by SAP. Customers who fail to apply these protective measures and allow unprotected SAP applications to continue to operate put themselves and their business at risk.