Security News
Linux endpoint detection and response will help Microsoft Defender customers secure Linux servers and networks against security nasties. Linux EDR will help Defender for Endpoint customers better protect Linux servers and networks and quickly take action against threats, Microsoft said.
Offensive Security has released Kali Linux 2020.4, the latest version of its popular open source penetration testing platform. ZSH is now Kali's new default shell on desktop images and cloud, Bash remains the default shell for other platforms for the time being.
Today, the California-based non-profit, which operates Let's Encrypt, introduced Prio Services, a way to gather online product metrics without compromising the personal information of product users. "Normally they would just send all of the metrics back to the application developer, but with Prio, applications split the metrics into two anonymized and encrypted shares and upload each share to different processors that do not share data with each other."
Businesses increasingly embrace the moving of multiple applications to the cloud using containers and utilize Kubernetes for orchestration, according to Zettaset. While many companies are eager to adopt these new cloud-native technologies, research shows that companies are not accurately weighing the benefits of enterprise IT innovation with inherent security risks.
Announcing the launch of Resilience Insurance, a newly formed program manager with insurance capacity rated "A+" by A.M. Best, provided through Intact Insurance Specialty Solutions' underwriting companies. "Resilience is reinventing cyber insurance by aligning our interests with those of the companies we insure," said Mario Vitale, President of Resilience.
The APT threat landscape is a mixed bag of tried-and-true tactics and cutting-edge techniques, largely supercharged by geo-politics, a report finds. Advanced persistent threat groups continue to use the fog of intense geopolitics to supercharge their campaigns, but beyond these themes, actors are developing individual signature tactics for success.
We'll guide you through the process of using Homebrew package manager to install security tools on macOS to perform reconnaissance, discovery, and fingerprinting of the devices on your network. Evidenced through the classic "I'm a Mac" ads, Macs were not immune to malware: It's just that with such a negligible market share, threat actors did not really target Apple devices as much as devices running Windows, which posed a much larger target-with greater rewards for their efforts.
These findings indicate that as SOCs continue to mature, they will deploy next-gen tools and capabilities at an unprecedented rate to address gaps in security. Further, the scale of technology needed to secure today's digital assets means SOC teams are relying more heavily on tools to effectively do their jobs.
Prizes for bad actors can be access to stolen data and tools to make hacks easier, according to new research from Trend Micro. Cybercriminals have put their own spin on passing time with online rap battles, poker tournaments, poem contests, and In-person sport tournaments.
International Data Corporation published a new assessment of eleven companies offering the tools and frameworks for developing advanced machine learning models and solutions. The eleven advanced machine learning platform providers evaluated in this MarketScape report are: Alteryx, Amazon Web Services, Cloudera, Dataiku, DataRobot, Google, H2O.ai, IBM, MathWorks, Microsoft, and SAS. Advanced machine learning platforms provide a range of ML methods primarily working with structured and semi-structured data to create predictive and prescriptive models that are then used in applications.