Day: September 29, 2021

Top Russian Cybersecurity CEO Charged with Treason

Group-IB’s Ilya Sachkov Arrested on Treason Charges; Cybersecurity Leaders Speak OutThe founder of Group-IB, one of Russia’s largest cybersecurity companies, has been detained on state treason charges and will be held in custody for two months, with alleged crimes punishable by up to 20 years in prison, according to wire reports.Read the article

NETSCOUT and Palo Alto Networks support SOCs in mitigating security threats in hybrid environments

NETSCOUT and Palo Alto Networks announced that their fully integrated security solutions are now available to support security operations centers (SOCs) in detecting, analyzing, and mitigating security threats in complex hybrid environments. “Integrating NETSCOUT’s Arbor Sightline and Arbor Edge Defense solutions with our Cortex XSOAR platform helps our joint customers enhance their security operations with …

NETSCOUT and Palo Alto Networks support SOCs in mitigating security threats in hybrid environments Read More »

5 claves para luchar contra el fraude

Muchas compañías de diversos sectores (principalmente el bancario) se enfrentan constantemente a casos de fraude que generan millonarias pérdidas año tras año. Sin embargo, las últimas tendencias en ciberseguridad brindan algunas opciones para luchar contra esta amenaza. La más reciente … The post 5 claves para luchar contra el fraude appeared first on ManageEngine Blog. The …

5 claves para luchar contra el fraude Read More »

Akamai Acquires Guardicore for Microsegmentation Platform

Akamai Technologies today announced it has acquired Guardicore, a provider of a platform that enables IT teams to microsegment application workloads to limit the blast radius of any malware infestation, for approximately $600 million. Charlie Gero, vice president and CTO of Akamai Security Technology Group, said Guardicore provides a granular approach to microsegmentation that Akamai.. …

Akamai Acquires Guardicore for Microsegmentation Platform Read More »

Best Ransomware Removal Tools

Ransomware is everywhere these days, striking fear into the hearts of IT and business managers alike. And studies support that perception, showing ransomware growing in both prevalence and effectiveness. Recent research by Positive Technologies looked at the cyber threat landscape during Q2 2021 and found that ransomware attacks reached “stratospheric” levels, accounting for 69% of …

Best Ransomware Removal Tools Read More »

How Cloudflare provides tools to help keep IPFS users safe

Cloudflare’s journey with IPFS started in 2018 when we announced a public gateway for the distributed web. Since then, the number of infrastructure providers for the InterPlanetary FileSystem (IPFS) has grown and matured substantially. This is a huge benefit for users and application developers as they have the ability to choose their infrastructure providers. Today, …

How Cloudflare provides tools to help keep IPFS users safe Read More »

Researchers discover bypass ‘bug’ in iPhone Apple Pay, Visa to make contactless payments

UK academics have uncovered mobile security issues in Visa and Apple payment mechanisms that could result in fraudulent contactless payments. On Thursday, academics from the UK’s University of Birmingham and University of Surrey revealed the technique, in which attackers could bypass an Apple iPhone’s lock screen to access payment services and make contactless transactions.  A …

Researchers discover bypass ‘bug’ in iPhone Apple Pay, Visa to make contactless payments Read More »

Researchers discover bypass 'bug' in iPhone Apple Pay, Visa to make contactless payments

UK academics have uncovered mobile security issues in Visa and Apple payment mechanisms that could result in fraudulent contactless payments. On Thursday, academics from the UK’s University of Birmingham and University of Surrey revealed the technique, in which attackers could bypass an Apple iPhone’s lock screen to access payment services and make contactless transactions.  A …

Researchers discover bypass 'bug' in iPhone Apple Pay, Visa to make contactless payments Read More »

Apple joins Cyber Readiness Institute as Co-Chair to improve cyber readiness for SMBs

The Cyber Readiness Institute (CRI) welcomed Apple as a Co-Chair of the organization. Apple joins CRI to further our mission to help small and medium-sized businesses (SMBs) as critical components of global supply chains improve their cyber readiness and become more secure. “We are very excited to welcome Apple as a Co-Chair of the Cyber …

Apple joins Cyber Readiness Institute as Co-Chair to improve cyber readiness for SMBs Read More »

McAfee appoints Gagan Singh as Chief Product and Revenue Officer

McAfee announced that Gagan Singh has joined McAfee as Executive Vice President and Chief Product and Revenue Officer. Singh joins from NortonLifeLock where he served as the Chief Product Officer responsible for Product, Strategy, e-Commerce, Customer Success, Product Marketing, Engineering, and Design. Singh previously also held the role of Chief Product Officer at Avast and …

McAfee appoints Gagan Singh as Chief Product and Revenue Officer Read More »

Don’t look a GriftHorse in the mouth: Trojan trampled 10 million Android devices

You may be advised not to look a gift horse in the mouth, lest you appear ungrateful for questioning its health. But you probably want to examine your Android phone for GriftHorse, or rather for any of the 200 or so apps with different names that incorporate the malicious code. Mobile security firm Zimperium, which …

Don’t look a GriftHorse in the mouth: Trojan trampled 10 million Android devices Read More »

Don't look a GriftHorse in the mouth: Trojan trampled 10 million Android devices

You may be advised not to look a gift horse in the mouth, lest you appear ungrateful for questioning its health. But you probably want to examine your Android phone for GriftHorse, or rather for any of the 200 or so apps with different names that incorporate the malicious code. Mobile security firm Zimperium, which …

Don't look a GriftHorse in the mouth: Trojan trampled 10 million Android devices Read More »

Shades of SolarWinds Attack Malware Found in New ‘Tomiris’ Backdoor

Advanced persistent threat (APT) actors rarely simply stop operations when their malware and techniques get exposed. Many just regroup, refresh their toolkits, and resume operations when the heat has died down a bit. Such appears to be the case — at least circumstantially — with DarkHalo, the Russian-government affiliated threat actor behind the supply attack …

Shades of SolarWinds Attack Malware Found in New ‘Tomiris’ Backdoor Read More »

Egress hires Steven Malone as VP of Product Management

Egress hired Steven Malone as its new VP of Product Management to spearhead the ongoing development of its human layer security platform. Malone joins Egress from Mimecast, where he played a key role in delivering their email security product strategy and driving revenue growth during an eight-year tenure that saw them IPO in late 2015 …

Egress hires Steven Malone as VP of Product Management Read More »

Kevin Delane joins Cohesity as CRO

Cohesity announced the appointment of Kevin Delane as chief revenue officer. He brings more than 30 years of relevant experience working for high-growth technology companies. Delane has a strong track record in business development, go-to-market, sales operations, international sales, strategic alliances, and partner management. Delane will leverage his vast experience in these areas to oversee …

Kevin Delane joins Cohesity as CRO Read More »

Hackers exploit critical vulnerability in Atlassian Confluence to install cryptocurrency mining malware on affected systems

Cybersecurity specialists reported that a group of threat actors is actively exploiting a critical vulnerability in Atlassian Confluence deployments on vulnerable Windows and Linux. These attacks aim to install webshells working as crypto miners on affected systems. Tracked as CVE-2021-26084, it was described as an Object-Graph Navigation Language (OGNL) injection flaw that could be exploited …

Hackers exploit critical vulnerability in Atlassian Confluence to install cryptocurrency mining malware on affected systems Read More »

What if On-Prem Cloud Strategy Relied on Policy-as-Code Rather Than Taking Inventory?

This blog was originally published by Secberus here.Let’s focus on creating cloud security policies that govern hybrid environments.Fausto Lendeborg, CEO of Secberus, and Everett Young, COO, spend a lot of their time talking about the future of cloud governance. And the rest of their time nabling the Secberus team to build a solution that brings …

What if On-Prem Cloud Strategy Relied on Policy-as-Code Rather Than Taking Inventory? Read More »