Cyber Security
NETSCOUT?s Latest Threat Intelligence Report Uncovers Prime Targets for Cyber Criminals as Attacks Accelerate
NETSCOUT SYSTEMS announced the findings of its Threat Intelligence Report for the first half of 2019. The report underscores how dramatically the cybercriminal business model has matured into an efficient, global operation and the increasing geographical diversity and proliferation of nation-state Advance Persistent Threats (APT) groups. It reinforces the need for companies to minimize risks by having a better view of the threat landscape.
Capital One Hack ?Could be Tip of the Iceberg?
The data breach of US bank Capital One that this week exposed the personal data of over 100-million US customers may be only the start of a series of breach notifications from other organisations. According to research conducted by Israel-based cybersecurity company CyberInt, the threat actor allegedly responsible for the Capital One breach tried to mask their identity and IP address by connecting to ?IPredator?, a Sweden-based virtual private network.
French YouTuber Micode Infiltrates a Tech Support Scammers Network
In a recent series of videos on his YouTube channel aiming to popularize cyber-security, Micode looked into one of the most lucrative scams of the internet. The investigation brought him on the other side of the world in Mauritus for 3 episodes, of which the first have almost reached 1 million views. The 3 episodes have recently been subtitled in English for an international audience to understand how this very popular scam works.
WatchGuard Speeds Zero Day Malware Breach Detection from Months to Minutes
WatchGuard® Technologies announced a series of major updates to its threat correlation and response platform, ThreatSync, with the latest release of Threat Detection and Response. These enhancements include accelerated breach detection, network process correlation and AI-powered threat analysis, enabling managed service providers and the organizations they support to reduce breach detection and containment timeframes from months to minutes.
In Just One Evil Internet Minute Over Two Phish are Detected and $2.9 Million is Lost to Cybercrime, Reveals RiskIQ
RiskIQ released its annual ?Evil Internet Minute? report. The company tapped proprietary global intelligence and third-party research to analyze the volume of malicious activity on the internet, revealing that cybercriminals cost the global economy $2.9 million every minute last year, a total of $1.5 trillion. The data shows that in a single internet minute, $2,900,000 is lost to cybercrime. Top companies pay $25 per minute due to security breaches.
Genetec Partners with BlackBerry Cylance to Include AI-based Antivirus in its Appliance Portfolio
Genetec announced that it is partnering with Cylance, a business unit of BlackBerry, Limited, to bring AI-based antivirus protection to its appliances customers. Through this partnership, Genetec will offer additional cybersecurity protection. Genetec Streamvault all-in-one and rackmount appliances, storage, and workstations are expected to be shipped pre-installed and optimized with CylancePROTECT in September 2019.
ID Incognito Launches a Web App for Online Privacy
ID Incognito is a new web app dedicated to protecting your personal information online. The app was made in response to the growing need to provide personal information in order to use services online, specifically phone numbers and email addresses. The app works by providing phone number and email address aliases for users to give as info whenever signing up for services, subscriptions, or anything else requiring personal info online.
Major Study of Cybersecurity Operations Professionals Reveals Heavy Workload, Lack of Maturity in Four out of Five Businesses
Siemplify released the 2019 Security Operations Maturity Report, revealing critical insights and trends into the state of SecOps, from size and structure of programs to key challenges and growth initiatives. The report is based on a survey of more than 250 security operations practitioners working at enterprises and managed security service providers (MSSPs), who were asked to assess a litany of subjects related to their responsibilities, impediments and needs.
HID Global Helps Put ID Cards and Documents into the Hands of Millions Throughout Africa
The latest additions to HID Global?s portfolio address the challenges African nations face in issuing credentials to remote locations while also serving high-volume needs of large metropolitan areas. The company?s HID FARGO Connect solution enables ID cards to be issued from anywhere and any device via a web interface in a trusted environment, changing the paradigm for governments whose citizens live in distant, hard-to-reach locations with limited infrastructure.
Johnson Controls Introduces New Audit Trails and Feature Enhancements in EntraPass v8.10
Johnson Controls has released the newest version of Tyco Kantech EntraPass security management software, enabling new functionalities such as expanded audit features and other enhancements for a more streamlined experience for users. For faster auditing and troubleshooting, EntraPass v8.10 users can run audit reports based on cards, components and operators, including a detailed report of who made changes to a card or component and when the changes were made.
Secured Forum 2019 to Feature Keynote Presentation From the NSA?s David Hogue
The Security Industry Association (SIA), ISC Security Events and PSA Security Network have announced David Hogue of the National Security Agency (NSA) as one of the keynote speakers for the second annual Cyber:Secured Forum – a cybersecurity educational summit centered on how to improve and maintain the cybersecurity of integrated solutions and physical security systems. The second annual cybersecurity educational summit will be held July 29-31 in Dallas, Texas.
Infocyte Launches First Agentless Cloud Workload Protection Platform, Strengthens Check Point Software?s Threat Detection and Incident Response Capabilities in Dynamic AWS Environments
Infocyte announced the availability of Infocyte HUNT Cloud for Amazon Web Services (AWS) ? the first solution combining comprehensive detection and IR for high-growth cloud environments, unlike traditional endpoint protection platforms (EPPs) which don’t address cloud workloads. Infocyte HUNT Cloud for AWS features agentless deployment through AWS APIs and artificial intelligence (AI) to quickly identify, categorize and respond to persistent, hidden and other advanced threats and vulnerabilities. Leveraging AWS CloudTrail, Activity Trace? provides immediate insight into the root cause of threats at the host and cloud management layers, enabling instantaneous IR and remediation. Availability of Infocyte HUNT Cloud on the leading cloud services platforms begins with AWS and will expand to Microsoft Azure and Google Cloud Platform (GCP) later this year.
March Networks Confirmed as a Cybersecure Business for Second Consecutive Year
March Networks® announce that it has been designated as a cybersecure business by Cyber Essentials Canada for a second consecutive year. March Networks was the first company in the country to achieve the certification in 2018 and is the first to re-certify through the program this year. Developed as part of the U.K.?s National Cyber Security Programme, Cyber Essentials certification is awarded to organizations able to demonstrate good cybersecurity practices.
Data Privacy Research Front and Center at Human Computer Interaction Event
Shortcomings of security breach notifications, best practices for phishing warnings and lessons learned from the use of analytics to improve student performance are among several studies University of Michigan researchers will present beginning this weekend in the United Kingdom. Florian Schaub, assistant professor at the U-M School of Information, and colleagues will share their work May 4-9 at the CHI Conference on Human Factors in Computing in Glasgow, Scotland.
Trust Issues: New Survey Sheds Light on Americans? Biggest Security Concerns
Lots of homeowners are investing in modern technologies like smart assistants, smart speakers, and internet-connected security cameras. And while all this technology makes life easier at home, it also raises concerns as more people worry about things like getting hacked, being spied on, and having their identity stolen. ASecureLife.com surveyed hundreds of Americans across the country to get a sense for how much people trust the new-age technology filling their homes
Suspected Russian-speaking Threat Actors ?TA505? Continues Cybercrime Spree Against Global Retailers & Financial Institutions
Investigation from CyberInt?s Research Lab has connected a single gang to a range of attacks against retailers and financial institutions around the world using legitimate remote access software. CyberInt?s managed detection and response solutions protect the world?s leading companies. The group has used the same tactics, techniques and procedures along with the repeated nefarious use of an off-the-shelf commercial remote administration tool, ?Remote Manipulator System?.
Florida Reports 4th Most ID Theft Cases
A new report from A Secure Life showcases the states with the highest rate of Identity Theft. According to the report, Florida ranks 4th in the nation for the number of Identity Theft cases. Identity Theft affects not just you, but your entire family. Knowing what to do if you become a victim can save hours of your life trying to get your identity restored, as well as make the difference in your ability to recover from this dilemma and restore your accounts.
Faster Security Investigations Unveiled As Part of IndigoVision?s New product Innovations at America?s Largest Security Event
Security innovator IndigoVision is set to introduce a range of new features that will lead to faster security investigations and drive down industry storage costs as part of its presence at ISC West 2019 in Las Vegas. Trusted in installations across the world, and with 25 years of experience in developing complete end-to-end security surveillance solutions, IndigoVision?s latest innovations will be unveiled as part of an array of new features being introduced to Control Center, its intuitive Security Management Solution.
nCipher: 2019 Global Encryption Trends Study
nCipher Security, the provider of trust, integrity and control for business critical information and applications, announces that as organizations embrace the cloud and new digital initiatives such as the internet of things (IoT), blockchain and digital payments the use of trusted cryptography to protect their applications and sensitive information is at an all-time high, according to the 2019 Global Encryption Trends Study from the Ponemon Institute.
Recent Social Warfare Vulnerability Allowed Remote Code Execution
Wordfence detailed
