Security News
The funding comes as Cyble graduates from Y Combinator, which accepted Cyble into its Winter 2021 cohort and provided pre-seed funding in January of this year. "As we continue to deliver what modern organizations need, the seed funding reaffirms our strategy and vision. It will enable Cyble to onboard resources and scale our SaaS platform, Cyble Vision, in lock step with our rapidly growing client base," says Manish Chachada, COO and Co-founder of Cyble.
Threat actors are constantly targeting new vulnerabilities in SAP applications within days after the availability of security patches, according to a joint report issued by SAP and Onapsis. Used within more than 400,000 organizations for resource planning, management of product lifecycle, human capital, and supply chain, and for various other purposes, SAP's applications represent an attractive target for adversaries.
Perform advanced threat hunting using logs from THF Huntpoint, email channel, traffic and behavior markers of each analyzed file from any source. THF Huntbox enables incident management, correlation of events and collaboration between analysts during threat hunting and IR activities.
Organizations in the financial and insurance sectors were the most targeted by threat actors in 2020, continuing a trend that was first observed roughly five years ago, IBM Security reports. Retail and professional services rounded up the top five most targeted sectors, IBM says.
The U.S. government is working to draw attention to supply chain vulnerabilities, an issue that received particular attention late last year after suspected Russian hackers gained access to federal agencies and private corporations by sneaking malicious code into widely used software. The NCSC said it is working with other agencies, including the Cybersecurity and Infrastructure Security Agency, to raise awareness of the supply chain issue.
CI/CD pipelines have become the backbone of modern DevOps environments and a crucial component of most software companies' operations. Developers can build code, run tests, and deploy new versions of software swiftly and securely.
GuardDog PCS creates the first plug-and-protect proactive cybersecurity solution for edge networks and network attached devices in a space the company refers to as 'Edge Territory' - the space beyond where traditional remote network and device management solutions can offer visibility or protection. GuardDog protects against threats outside the perimeter of the network or on attached devices that other solutions can't see, for wired and Wi-Fi networks.
Autohost launched the Autohost Threat Intelligence platform to help hotels and short-term rental property managers and operators guard against a growing number of risks, including deceptive bookings, identity theft and credit card fraud. The Autohost Threat Intelligence platform is open source, cloud-based and able to integrate with property management systems, and other platforms that operators leverage, to provide additional security context for guest vetting.
Zimperium announced that it is collaborating with Oracle to offer Zimperium's mobile threat defense solutions on Oracle Cloud Infrastructure. The two companies are working together to help enterprises around the world combat advanced mobile threats.
Remote work and increased cybersecurity threats presented both challenges and opportunities for MSPs
Sixty-five percent of MSPs increased their revenue from delivering cybersecurity services even during the recession brought on by the pandemic, according to Kaseya. Cybersecurity is becoming more and more critical to SMBs-77% of MSPs reported that their clients were hit with a cyberattack, according to Kaseya's newly-released 2021 MSP Benchmark Survey.