Security News

Perform advanced threat hunting using logs from THF Huntpoint, email channel, traffic and behavior markers of each analyzed file from any source. THF Huntbox enables incident management, correlation of events and collaboration between analysts during threat hunting and IR activities.

Organizations in the financial and insurance sectors were the most targeted by threat actors in 2020, continuing a trend that was first observed roughly five years ago, IBM Security reports. Retail and professional services rounded up the top five most targeted sectors, IBM says.

The U.S. government is working to draw attention to supply chain vulnerabilities, an issue that received particular attention late last year after suspected Russian hackers gained access to federal agencies and private corporations by sneaking malicious code into widely used software. The NCSC said it is working with other agencies, including the Cybersecurity and Infrastructure Security Agency, to raise awareness of the supply chain issue.

CI/CD pipelines have become the backbone of modern DevOps environments and a crucial component of most software companies' operations. Developers can build code, run tests, and deploy new versions of software swiftly and securely.

GuardDog PCS creates the first plug-and-protect proactive cybersecurity solution for edge networks and network attached devices in a space the company refers to as 'Edge Territory' - the space beyond where traditional remote network and device management solutions can offer visibility or protection. GuardDog protects against threats outside the perimeter of the network or on attached devices that other solutions can't see, for wired and Wi-Fi networks.

Autohost launched the Autohost Threat Intelligence platform to help hotels and short-term rental property managers and operators guard against a growing number of risks, including deceptive bookings, identity theft and credit card fraud. The Autohost Threat Intelligence platform is open source, cloud-based and able to integrate with property management systems, and other platforms that operators leverage, to provide additional security context for guest vetting.

Zimperium announced that it is collaborating with Oracle to offer Zimperium's mobile threat defense solutions on Oracle Cloud Infrastructure. The two companies are working together to help enterprises around the world combat advanced mobile threats.

Remote work and increased cybersecurity threats presented both challenges and opportunities for MSPs
Sixty-five percent of MSPs increased their revenue from delivering cybersecurity services even during the recession brought on by the pandemic, according to Kaseya. Cybersecurity is becoming more and more critical to SMBs-77% of MSPs reported that their clients were hit with a cyberattack, according to Kaseya's newly-released 2021 MSP Benchmark Survey.

Elastic announced new updates across the Elastic Security solution in the 7.12 release to accelerate threat hunting and investigation workflows, prevent ransomware, and eliminate blind spots. Elastic Security streamlines security operation workflows and helps practitioners maximize data insights with analyst-driven correlation.

Threat Stack announced the Threat Stack Cloud Security Platform now offers new security analytics. Threat Stack now allows organizations to proactively assess and strengthen an organization's security posture by quickly accessing, filtering, and visualizing security data.