Cyber Security

Lilu / Lilocked Ransomware Attacks

Lilu, also known as Lilocked, a new strain of ransomware, has now infected thousands of Linux servers since mid-July. Chris Gerritz, the co-founder of Infocyte, a pioneer in proactive threat detection and incident response, is available to comment on these attacks. Chris, the U.S. Air Force CERT?s former chief of defensive counter-cyber operations shares his notes.

Kingston to Showcase Cyber Security Solutions Amid Increasing Customer Data Privacy Regulations

Kingston Digital announced it will showcase an array of products at GSX 2019, the leading trade event for security professionals. Amid increasing concerns about data security, the company will showcase its full line of industry-leading encrypted USB Flash drive solutions, including the IronKey? brand, high-density client and enterprise SSDs and Server Premier memory.

Securing Maritime Assets Demands a New Approach

At this moment, cyber-attacks threaten thousands of vulnerable cargo ships, which carry billions of dollars’ worth of goods. Due to the lack of maritime-specific cybersecurity solutions, vessels are highly susceptible to digitally-led hijackings or even ransomware. This threat can wreak havoc on global shipping. With Artificial Intelligence functionality, future solutions include autonomous safety mechanisms which recognize that they are the sole line of defense.

MOBOTIX Obtains the CNPP Trust Passport, Integrating the Cyber-Security Dimension in All of Its Digital Video Surveillance Camera Systems

MOBOTIX is the first manufacturer in Europe to obtain French CNPP certified product certification for its video surveillance cameras, offering a guarantee of IT and electronic ?resistance? to cyber-attacks. MOBOTIX announced its intention to focus more on cyber-security over one and a half years ago, in particular by launching the ?MOBOTIX Cactus Concept.? CNPP is a key player in France in risk prevention and control.

NETSCOUT?s Latest Threat Intelligence Report Uncovers Prime Targets for Cyber Criminals as Attacks Accelerate

NETSCOUT SYSTEMS announced the findings of its Threat Intelligence Report for the first half of 2019. The report underscores how dramatically the cybercriminal business model has matured into an efficient, global operation and the increasing geographical diversity and proliferation of nation-state Advance Persistent Threats (APT) groups. It reinforces the need for companies to minimize risks by having a better view of the threat landscape.

Capital One Hack ?Could be Tip of the Iceberg?

The data breach of US bank Capital One that this week exposed the personal data of over 100-million US customers may be only the start of a series of breach notifications from other organisations. According to research conducted by Israel-based cybersecurity company CyberInt, the threat actor allegedly responsible for the Capital One breach tried to mask their identity and IP address by connecting to ?IPredator?, a Sweden-based virtual private network.

French YouTuber Micode Infiltrates a Tech Support Scammers Network

In a recent series of videos on his YouTube channel aiming to popularize cyber-security, Micode looked into one of the most lucrative scams of the internet. The investigation brought him on the other side of the world in Mauritus for 3 episodes, of which the first have almost reached 1 million views. The 3 episodes have recently been subtitled in English for an international audience to understand how this very popular scam works.

WatchGuard Speeds Zero Day Malware Breach Detection from Months to Minutes

WatchGuard® Technologies announced a series of major updates to its threat correlation and response platform, ThreatSync, with the latest release of Threat Detection and Response. These enhancements include accelerated breach detection, network process correlation and AI-powered threat analysis, enabling managed service providers and the organizations they support to reduce breach detection and containment timeframes from months to minutes.

In Just One Evil Internet Minute Over Two Phish are Detected and $2.9 Million is Lost to Cybercrime, Reveals RiskIQ

RiskIQ released its annual ?Evil Internet Minute? report. The company tapped proprietary global intelligence and third-party research to analyze the volume of malicious activity on the internet, revealing that cybercriminals cost the global economy $2.9 million every minute last year, a total of $1.5 trillion. The data shows that in a single internet minute, $2,900,000 is lost to cybercrime. Top companies pay $25 per minute due to security breaches.

Genetec Partners with BlackBerry Cylance to Include AI-based Antivirus in its Appliance Portfolio

Genetec announced that it is partnering with Cylance, a business unit of BlackBerry, Limited, to bring AI-based antivirus protection to its appliances customers. Through this partnership, Genetec will offer additional cybersecurity protection. Genetec Streamvault all-in-one and rackmount appliances, storage, and workstations are expected to be shipped pre-installed and optimized with CylancePROTECT in September 2019.

ID Incognito Launches a Web App for Online Privacy

ID Incognito is a new web app dedicated to protecting your personal information online. The app was made in response to the growing need to provide personal information in order to use services online, specifically phone numbers and email addresses. The app works by providing phone number and email address aliases for users to give as info whenever signing up for services, subscriptions, or anything else requiring personal info online.

Major Study of Cybersecurity Operations Professionals Reveals Heavy Workload, Lack of Maturity in Four out of Five Businesses

Siemplify released the 2019 Security Operations Maturity Report, revealing critical insights and trends into the state of SecOps, from size and structure of programs to key challenges and growth initiatives. The report is based on a survey of more than 250 security operations practitioners working at enterprises and managed security service providers (MSSPs), who were asked to assess a litany of subjects related to their responsibilities, impediments and needs.

HID Global Helps Put ID Cards and Documents into the Hands of Millions Throughout Africa

The latest additions to HID Global?s portfolio address the challenges African nations face in issuing credentials to remote locations while also serving high-volume needs of large metropolitan areas. The company?s HID FARGO Connect solution enables ID cards to be issued from anywhere and any device via a web interface in a trusted environment, changing the paradigm for governments whose citizens live in distant, hard-to-reach locations with limited infrastructure.

Johnson Controls Introduces New Audit Trails and Feature Enhancements in EntraPass v8.10

Johnson Controls has released the newest version of Tyco Kantech EntraPass security management software, enabling new functionalities such as expanded audit features and other enhancements for a more streamlined experience for users. For faster auditing and troubleshooting, EntraPass v8.10 users can run audit reports based on cards, components and operators, including a detailed report of who made changes to a card or component and when the changes were made.

Secured Forum 2019 to Feature Keynote Presentation From the NSA?s David Hogue

The Security Industry Association (SIA), ISC Security Events and PSA Security Network have announced David Hogue of the National Security Agency (NSA) as one of the keynote speakers for the second annual Cyber:Secured Forum – a cybersecurity educational summit centered on how to improve and maintain the cybersecurity of integrated solutions and physical security systems. The second annual cybersecurity educational summit will be held July 29-31 in Dallas, Texas.

Infocyte Launches First Agentless Cloud Workload Protection Platform, Strengthens Check Point Software?s Threat Detection and Incident Response Capabilities in Dynamic AWS Environments

Infocyte announced the availability of Infocyte HUNT Cloud for Amazon Web Services (AWS) ? the first solution combining comprehensive detection and IR for high-growth cloud environments, unlike traditional endpoint protection platforms (EPPs) which don’t address cloud workloads. Infocyte HUNT Cloud for AWS features agentless deployment through AWS APIs and artificial intelligence (AI) to quickly identify, categorize and respond to persistent, hidden and other advanced threats and vulnerabilities. Leveraging AWS CloudTrail, Activity Trace? provides immediate insight into the root cause of threats at the host and cloud management layers, enabling instantaneous IR and remediation. Availability of Infocyte HUNT Cloud on the leading cloud services platforms begins with AWS and will expand to Microsoft Azure and Google Cloud Platform (GCP) later this year.

March Networks Confirmed as a Cybersecure Business for Second Consecutive Year

March Networks® announce that it has been designated as a cybersecure business by Cyber Essentials Canada for a second consecutive year. March Networks was the first company in the country to achieve the certification in 2018 and is the first to re-certify through the program this year. Developed as part of the U.K.?s National Cyber Security Programme, Cyber Essentials certification is awarded to organizations able to demonstrate good cybersecurity practices.

Data Privacy Research Front and Center at Human Computer Interaction Event

Shortcomings of security breach notifications, best practices for phishing warnings and lessons learned from the use of analytics to improve student performance are among several studies University of Michigan researchers will present beginning this weekend in the United Kingdom. Florian Schaub, assistant professor at the U-M School of Information, and colleagues will share their work May 4-9 at the CHI Conference on Human Factors in Computing in Glasgow, Scotland.

Trust Issues: New Survey Sheds Light on Americans? Biggest Security Concerns

Lots of homeowners are investing in modern technologies like smart assistants, smart speakers, and internet-connected security cameras. And while all this technology makes life easier at home, it also raises concerns as more people worry about things like getting hacked, being spied on, and having their identity stolen. ASecureLife.com surveyed hundreds of Americans across the country to get a sense for how much people trust the new-age technology filling their homes

Suspected Russian-speaking Threat Actors ?TA505? Continues Cybercrime Spree Against Global Retailers & Financial Institutions

Investigation from CyberInt?s Research Lab has connected a single gang to a range of attacks against retailers and financial institutions around the world using legitimate remote access software. CyberInt?s managed detection and response solutions protect the world?s leading companies. The group has used the same tactics, techniques and procedures along with the repeated nefarious use of an off-the-shelf commercial remote administration tool, ?Remote Manipulator System?.