Security News

Malwarebytes says its Office 365, Azure tenancies invaded by SolarWinds hackers, insists its tools are still safe to use
2021-01-20 14:44

Security company Malwarebytes suspects a breach of its Office 365 and Azure tenancies is by the same attacker behind the SolarWinds hack, but reckons flaws in Azure Active Directory security are also to blame. Malwarebytes, whose products include widely used anti-malware tools for consumers and businesses, said that it does not use SolarWinds but believes that the same attacker used "Another intrusion vector that works by abusing applications with privileged access to Microsoft Office 365 and Azure environments".

Malwarebytes says its Office 365, Azure tenancies have been breached, insists its tools are still safe to use
2021-01-20 14:44

Security company Malwarebytes suspects a breach of its Office 365 and Azure tenancies is by the same attacker behind the SolarWinds hack, but reckons flaws in Azure Active Directory security are also to blame. Malwarebytes, whose products include widely used anti-malware tools for consumers and businesses, said that it does not use SolarWinds but believes that the same attacker used "Another intrusion vector that works by abusing applications with privileged access to Microsoft Office 365 and Azure environments".

IAR Build Tools for Linux now supported by Parasoft C/C++test
2021-01-19 01:15

Parasoft announced its C/C++test update to support IAR Systems' build tools for Linux for Arm. IAR Build Tools for Linux inspired the update of Parasoft's unified testing solution for C/C++test software development.

How next-gen cloud SIEM tools can give critical visibility to companies for effective threat hunting
2021-01-15 16:39

When the move to the cloud was dramatically exacerbated by companies rapidly shifting to remote work, these tools fell short of supplying clear visibility into multiple environments and technology layers. The need to quickly adapt and scale to the new reality provided the perfect opportunity to accelerate the push to cloud, but outdated traditional security information and event management tools are not able to efficiently collect and process the high volume of telemetry generated by the multiple cloud services adopted as part of this push.

Homebrew: How to install exploit tools on macOS
2021-01-07 22:23

We'll guide you through the process of using Homebrew package manager to install security tools on macOS to exploit vulnerabilities found in your Apple equipment. In this follow-up to the installing security tools on macOS via Homebrew series, we'll be looking at various applications that can be used to exploit any vulnerabilities that have been found after performing an assessment using scanning tools to determine what-if any-issues exist.

Homebrew: How to install vulnerability tools on macOS
2021-01-07 20:27

We'll guide you through the process of using Homebrew package manager to install security tools on macOS to assess vulnerabilities and the security posture of the devices on your network. Some tools may be used to obtain vulnerability information from generic devices, while other tools are suited only to identify specific vulnerabilities related to certain types of applications and services, such as web servers, for example.

NSA shares guidance, tools to mitigate weak encryption protocols
2021-01-05 15:15

Implementing the measures in NSA's guidance eliminates the false sense of security provided by obsolete encryption protocols by helping block insecure TLS versions, cipher suites, and key exchange methods to properly encrypt network traffic. Updating TLS configurations will provide government and enterprise organizations with stronger encryption and authentication to help them build a better defense against malicious actors' attacks and protect important information.

Why cybersecurity tools fail when it comes to ambiguity
2020-12-25 10:00

"Cybersecurity is very good at identifying activities that are black or white-either obviously bad and dangerous or clearly good and safe," writes Margaret Cunningham, PhD, psychologist and principal research scientist at Forcepoint's Innovation Lab, in her research paper Exploring the Gray Space of Cybersecurity with Insights from Cognitive Science. "But, traditional cybersecurity tools struggle with ambiguity-our algorithms are not always able to analyze all salient variables and make a confident decision whether to allow or block risky actions."

Millions of Devices Affected by Vulnerabilities Used in Stolen FireEye Tools
2020-12-23 12:00

Millions of devices are exposed to potential attacks exploiting the vulnerabilities used in the tools that threat actors recently stole from FireEye, security and compliance solutions provider Qualys reported on Tuesday. Qualys said it identified more than 7.5 million instances related to vulnerabilities associated with the stolen FireEye tools and compromised versions of the SolarWinds Orion product.

ColorTokens Partner Program: Content, tools, and training in ColorTokens’ Zero Trust approach
2020-12-22 02:00

ColorTokens announced its ColorTokens Partner Program and Partner Portal, providing distributors, resellers, and other technology service providers the resources they need to get started in the enterprise information security market. The ColorTokens Partner Program allows easy entry for first-time cloud security partners, guiding them to develop skills, scale revenue, and achieve success.