Security News

Bitdefender released a report revealing top cybersecurity threats, frequency of threats and cybercrime trends of 2020. "Our 2020 findings depict consumers under constant assault from cybercriminals looking to capitalize on fear and societal uncertainty accompanying the global pandemic," said Bogdan Botezatu, director of threat research and reporting at Bitdefender.

As part of this partnership, Liquid Web customers can employ the Threat Stack Oversight Intrusion Detection System as an additional layer of security to Liquid Web servers with an advanced Intrusion Detection System. Together, Threat Stack Oversight and Liquid Web will provide customers with real-time monitoring for user, process, network, and file behaviors in critical systems across Linux and Windows servers.

SAP and Onapsis jointly released a cyber threat intelligence report providing actionable information on how malicious threat actors are targeting and potentially exploiting unprotected mission-critical SAP applications. Both companies note that many organizations still have not applied relevant mitigations that have long been provided by SAP. Customers who fail to apply these protective measures and allow unprotected SAP applications to continue to operate put themselves and their business at risk.

The funding comes as Cyble graduates from Y Combinator, which accepted Cyble into its Winter 2021 cohort and provided pre-seed funding in January of this year. "As we continue to deliver what modern organizations need, the seed funding reaffirms our strategy and vision. It will enable Cyble to onboard resources and scale our SaaS platform, Cyble Vision, in lock step with our rapidly growing client base," says Manish Chachada, COO and Co-founder of Cyble.

Threat actors are constantly targeting new vulnerabilities in SAP applications within days after the availability of security patches, according to a joint report issued by SAP and Onapsis. Used within more than 400,000 organizations for resource planning, management of product lifecycle, human capital, and supply chain, and for various other purposes, SAP's applications represent an attractive target for adversaries.

Perform advanced threat hunting using logs from THF Huntpoint, email channel, traffic and behavior markers of each analyzed file from any source. THF Huntbox enables incident management, correlation of events and collaboration between analysts during threat hunting and IR activities.

Organizations in the financial and insurance sectors were the most targeted by threat actors in 2020, continuing a trend that was first observed roughly five years ago, IBM Security reports. Retail and professional services rounded up the top five most targeted sectors, IBM says.

The U.S. government is working to draw attention to supply chain vulnerabilities, an issue that received particular attention late last year after suspected Russian hackers gained access to federal agencies and private corporations by sneaking malicious code into widely used software. The NCSC said it is working with other agencies, including the Cybersecurity and Infrastructure Security Agency, to raise awareness of the supply chain issue.

CI/CD pipelines have become the backbone of modern DevOps environments and a crucial component of most software companies' operations. Developers can build code, run tests, and deploy new versions of software swiftly and securely.

GuardDog PCS creates the first plug-and-protect proactive cybersecurity solution for edge networks and network attached devices in a space the company refers to as 'Edge Territory' - the space beyond where traditional remote network and device management solutions can offer visibility or protection. GuardDog protects against threats outside the perimeter of the network or on attached devices that other solutions can't see, for wired and Wi-Fi networks.