Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2021-09-23 12:55:14 |
CISO Stories Podcast: Fiscally Responsible Ways to Train and Build Community (lien direct) |
All organizations must have security awareness training programs to teach basics to end users. Similarly, the technical teams need to be exposed to flexible training that is interesting to them. |
|
|
|
|
2021-09-22 17:26:23 |
Threat Analysis Report: PrintNightmare and Magniber Ransomware (lien direct) |
The Cybereason Global Security Operations Center (GSOC) issues Cybereason Threat Analysis reports to inform on impacting threats. The Threat Analysis reports investigate these threats and provide practical recommendations for protecting against them. |
Threat
Ransomware
|
|
|
|
2021-09-22 12:59:45 |
How XDR is Changing Security for the Better (lien direct) |
The future of XDR (Extended Detection and Response) looks bright. As reported by MarketResearch.com, analyst firm Frost & Sullivan predicts that the global XDR market will grow by triple digits in the coming years. This optimistic prediction reflects the many benefits that XDR brings to organizations and their ongoing security efforts - we discuss four of those advantages below.
|
|
|
|
|
2021-09-22 12:00:00 |
Cybereason Partners with Sysware to Secure Indonesian Companies (lien direct) |
Cybereason Is partnering with Sysware, a leading software distributor in Indonesia, to protect Indonesian companies from sophisticated cyber attacks on endpoints and across their networks. |
Guideline
|
|
|
|
2021-09-21 12:17:42 |
How the Ransomware Gangs Stay One Step Ahead (lien direct) |
Ransomware attacks increased dramatically in the first half of 2021. As reported by ITProPortal, the volume of global ransomware hit 304.7 million during that six-month period. That's 0.1 million more ransomware attacks than the entire total in 2020. |
Ransomware
|
|
|
|
2021-09-20 12:39:11 |
Malicious Life Podcast: Jack Rhysider and the Darknet Diaries (lien direct) |
Jack Rhysider's show Darknet Diaries is the most popular cybersecurity podcast around - and one of the most successful tech podcasts in the US in general. We spoke with Jack about the origins of Darknet Diaries, his heroes and role models, and the effect the show's success has had on his personal life - which you might be surprised to discover wasn't always 100% positive - check it out... |
|
|
|
|
2021-09-20 12:15:31 |
(Déjà vu) Webinar: Inside the REvil Ransomware - Pick Your Path (lien direct) |
Today's ransomware actors are operating to devastating effect as evidenced by the Colonial Pipeline and JBS attacks, showing that a successful attack can disrupt any business. |
Ransomware
|
|
|
|
2021-09-17 22:47:27 |
Grief Gang\'s New Quadruple Extortion Scheme Doesn\'t Change the Game (lien direct) |
Imagine heading to work on a Monday morning. You stop at Starbucks on the way in for a little caffeine jumpstart. Traffic was bad-as usual, but you've seen worse. You sit down at your desk and bring your computer to life and find a message on the display letting you know your systems have been encrypted with ransomware. What do you do? |
|
|
|
|
2021-09-16 12:56:24 |
CISO Stories Podcast: Communications Before, During and After a Breach (lien direct) |
Figuring out what to do after a breach is the wrong time to start the planning process. Communications strategies must be in place well beforehand and there are many benefits to the cybersecurity program for implementing these strategies in advance. |
|
|
|
|
2021-09-15 12:46:32 |
Four Considerations for Evaluating XDR Platforms (lien direct) |
There's a growing need for the more holistic approach to threat detection and response that XDR can deliver. Why? Just look at what's going on in the digital threat landscape... |
Threat
|
|
|
|
2021-09-15 12:45:40 |
Three Pillars of Infosec: Confidentiality, Integrity and Availability (lien direct) |
Resurgent data breaches that can be tied back to a failure to adhere to basic infosec principles have been an unpleasant surprise in a world of modern security frameworks and maturing processes, but they serve as a useful reminder to us all that there is immense value in mastering the basics. |
|
|
|
|
2021-09-14 20:07:22 |
Update Your Apple Devices to Guard Against Pegasus Spyware Attacks (lien direct) |
Apple issued an emergency update yesterday for a critical vulnerability discovered in its iPhones, Apple Watches, and Mac computers. Researchers at Citizen Lab discovered a no-click zero-day exploit that works on all Apple devices that do not have the latest update. |
Vulnerability
|
|
|
|
2021-09-14 12:57:03 |
What is Driving the Surge of Ransomware Attacks? (lien direct) |
Some major ransomware attacks have dominated the headlines recently. Back in the beginning of May, for instance, the Colonial Pipeline Company suspended its daily transportation of 100 million gallons of fuel between Houston, Texas and New York Harbor following an infection at the hands of the DarkSide ransomware gang. The ensuing disruption caused fuel shortages as well as panic buying of gas along the East Coast. |
Ransomware
|
|
|
|
2021-09-13 12:56:00 |
Azurescape Vulnerability: More Evidence that Microsoft Should Leave Security to the Experts (lien direct) |
It's been a busy couple weeks for Microsoft-and not in a good way. Following the news that a configuration error left Azure cloud customer data exposed to potential compromise, and a security alert from Microsoft about an active exploit targeting a zero-day vulnerability in MSHTML, now there are reports of a critical security vulnerability that can allow attackers to compromise containers in Azure as well. |
Vulnerability
|
Uber
|
|
|
2021-09-13 12:48:26 |
Malicious Life Podcast: The Tesla Hack (lien direct) |
It's every company's nightmare: a mysterious stranger approached an employee of Tesla's Gigafactory in Nevada, and offered him 1 million dollars to do a very simple job - insert a malware-laden USB flash drive into a computer in the company and keep it running for 8 hours - check it out...
|
Hack
|
|
|
|
2021-09-13 12:39:19 |
Gartner Report: 2021 Competitive Landscape for Endpoint Protection Platforms (lien direct) |
The endpoint security landscape continues to evolve with buyers pursuing a vendor and agent consolidation strategy and moving away from best-of-breed solutions. Vendors are leveraging buyer sentiment by expanding portfolios and bundling offerings, while adding new offerings in EDR, XDR and MDR. |
|
|
|
|
2021-09-10 18:05:03 |
Microsoft Zero-Day-of-the-Month Club (lien direct) |
When it comes to zero day attacks against Microsoft products, I often feel like Bill Murray's character in the movie Groundhog Day. It seems like I keep waking up to the same scenario over and over and over, with attackers repeatedly exploiting zero-day vulnerabilities against Microsoft products. |
|
|
|
|
2021-09-10 16:00:00 |
THREAT ALERT: Microsoft MSHTML Remote Code Execution Vulnerability (lien direct) |
The Cybereason Global Security Operations Center (SOC) issues Cybereason Threat Alerts to inform customers of emerging impacting threats. The Alerts summarize these threats and provide practical recommendations for protecting against them. |
Threat
Vulnerability
|
|
|
|
2021-09-09 19:56:50 |
UN Breach Highlights Escalation of Cyber Threats (lien direct) |
Hackers have been inside the United Nations network for months. According to a report from Bloomberg, stolen credentials of a UN employee were sold on the Dark Web for as little as $1,000. The report claims that Russian-speaking cybercriminals sold access to the UN systems for months-from April through August of 2021. |
|
|
|
|
2021-09-09 12:46:23 |
CISO Stories Podcast: The Unpatchable Vulnerability that is Human Nature (lien direct) |
Rachel Tobac, CEO of SocialProof Security, delves into the inner-workings of social engineering exploits where she leverages her background in neuroscience and behavioral psychology to exploit the unpatchable vulnerability that is human nature - check it out... |
Vulnerability
|
|
|
|
2021-09-08 16:18:23 |
Ransomware Attackers Don\'t Take Holidays (lien direct) |
Not everyone took time off for Labor Day weekend. While millions of Americans enjoyed an extended weekend in honor of the holiday, cybercriminals were busy targeting Howard University with a ransomware attack. |
Ransomware
|
|
|
|
2021-09-08 13:30:00 |
Cybereason\'s Lodrina Cherne Joins Panel on Building a More Inclusive Future in Cybersecurity (lien direct) |
Cybereason's Lodrina Cherne, Principal Security Advocate in the Office of the CSO and Aspen Tech Policy Hub Fellow, will join other cyber experts in a discussion on inclusiveness sponsored by the Aspen Tech Policy Hub and Aspen Digital. |
|
|
|
|
2021-09-08 13:00:00 |
Cybereason and Smarttech247 Partner to Deliver Managed Detection and Response (lien direct) |
Businesses today face a constant barrage of cyber threats, including destructive ransomware attacks and other malicious activity. That's why Cybereason is joining forces with Smarttech247, a multi-award-winning MDR company, to defend joint customers through managed detection and response services that block cyber attacks on endpoints anywhere on their networks. |
Ransomware
|
|
|
|
2021-09-08 12:36:01 |
Busted: Taking Down Ransomware Attackers (lien direct) |
Ransomware has been big news this year. In March, the REvil/Sodinokibi ransomware gang infected Acer and demanded $50 million-the highest ransom demand from any ransomware group up to that point. That same gang then turned around a month later and demanded the same ransom from Apple after it failed to coerce Quanta Computer, one of the tech giant's business partners, into paying up. |
Ransomware
|
|
|
|
2021-09-07 12:15:05 |
Malicious Life Podcast: Understanding China\'s Cyber Culture (lien direct) |
Lt. Colonel (Ret.) Bill Hagestad examines how China's culture and troubled history of western colonialism influenced its government views and actions regarding the global internet and its interactions with western technology companies such as Google and Nortel - check it out... |
|
|
|
|
2021-09-02 21:22:38 |
Microsoft Vulnerability Exposes Thousands to Risk…Again (lien direct) |
I can't deny that Microsoft competes with Cybereason, but the truth is, I owe a lot of the success of Cybereason to Microsoft. After all, the lion's share of what we do as defenders is protect against exploits targeting vulnerable Microsoft platforms and applications. |
Vulnerability
|
|
|
|
2021-09-02 20:46:00 |
Cybersecurity Is National Security (lien direct) |
President Biden convened a meeting at the White House last week to focus on cybersecurity. After months of escalating cyber attacks that have affected critical infrastructure providers, the food supply chain, and even disrupted distribution of COVID-19 vaccines and hospitals at capacity struggling to treat COVID patients, it is time to draw a line in the sand. One thing that is increasingly evident as the lines have blurred for cyber attacks is that cybersecurity is national security. |
|
|
|
|
2021-09-02 13:04:13 |
CISO Stories Podcast: Did You Ask For (and Get) Too Much Security Budget? (lien direct) |
It seems CISOs are typically lamenting that the security budgets are insufficient. While this can represent a significant problem in achieving information security goals, what happens when you get the funding you asked for and are asked to spend it in less time than expected? |
|
|
|
|
2021-09-01 13:02:03 |
The Value Drivers for an XDR Investment (lien direct) |
We have a pretty good idea by now of what Extended Detection and Response (XDR) is. As we noted in an earlier article, titled XDR: The Next Step in Threat Detection and Response, XDR is a security approach that builds on the successes of Endpoint Detection and Response (EDR). |
Threat
|
|
|
|
2021-08-31 13:35:38 |
ESG Research Report: 2021 Trends in Endpoint Security (lien direct) |
As security threats quickly continue to evolve, our approaches to security must evolve as well. Simple signature-based antivirus solutions are no longer enough to prevent the highly targeted attacks of today, making traditional solutions an inadequate defense. |
|
|
|
|
2021-08-31 12:01:26 |
Evolving Ransomware Tactics Include Recruiting Insiders and DDoS Attacks (lien direct) |
The attention generated by the DarkSide ransomware attack against Colonial Pipeline in May has helped to reshape the ransomware threat landscape. One of the most important modifications came when the digital crime forum XSS announced that members could no longer post about ransomware topics. The Exploit forum followed suit not long after, as reported by Bleeping Computer. |
Threat
Ransomware
|
|
|
|
2021-08-30 12:44:17 |
Malicious Life Podcast: The Life and Times of John McAfee (lien direct) |
What do you get when you take a gun-toting cybersecurity pioneer and add some drugs and a serious amount of money to the mix? You get a life so bizarre, so unbelievably extreme that people will tell your story long after you're long gone. It's all part of John McAfee's unbelievable life and times - check it out... |
|
|
|
|
2021-08-26 20:21:25 |
Afghanistan, the Taliban and National Security (lien direct) |
The United States may have left classified or sensitive intelligence behind as US forces withdrew and evacuated from Afghanistan. That information might now be in the hands of the Taliban. There was also a report this week about an alleged cyber breach at the US State Department. These are both concerns with potential implications for national security, but there is no need to panic. |
|
|
|
|
2021-08-26 12:42:47 |
CISO Stories Podcast: Practical Considerations for Managing Your MSSP (lien direct) |
For many organizations, large and small, it would be impractical to “skill up” to manage all aspects of cybersecurity. Managed Security Service Providers (MSSPs) provide many different services. |
|
|
|
|
2021-08-25 13:09:12 |
How XDR Delivers on SOAR\'s Unfulfilled Promises (lien direct) |
Security Orchestration, Automation, and Response (SOAR) is on the rise. According to MarketsandMarkets, the SOAR market is expected to increase from $868 million in 2019 to $1.791 million by 2024. Such growth would occur at a CAGR of 15.6% in that period - but are organizations getting the value out of SOAR they anticipated?
|
|
|
|
|
2021-08-24 19:43:41 |
Implications of the Alleged State Department Breach (lien direct) |
The US State Department was reportedly hit by another cyber attack, although it has not been officially confirmed. Whether or not the attack occurred, it is a simple fact that government agencies and private organizations are under constant siege, and that the security professionals tasked with protecting against attacks need to remain vigilant. |
|
|
|
|
2021-08-24 11:55:10 |
Cybereason vs. LockBit2.0 Ransomware (lien direct) |
The Cybereason Nocturnus team has been tracking the LockBit ransomware since it first emerged in September 2019 as a ransomware-as-a-service (RaaS). Following the rise of the new LockBit2.0 and the latest events, including the attack against the global IT company Accenture, we wanted to provide more information about the attack and show how the Cybereason Defense Platform protects customers from this threat. |
Ransomware
|
|
|
|
2021-08-23 16:23:21 |
Webinar: Extended Detection and Response (XDR) - Past, Present and Future (lien direct) |
If you've been feeling critical about your company's ability to identify and defeat modern attacks, you're not alone. Our world is one where IT infrastructure, attacker trends, and workspace norms continue to shift, so it's an increasingly difficult challenge to build a resilient infosec program backed by tested best practices. |
|
|
|
|
2021-08-23 12:01:58 |
(Déjà vu) Malicious Life Podcast: Ten Years On - Are We Doing Security Right? (lien direct) |
The company's leadership knew they had been breached in a sophisticated APT-style attack, but it was unknown whether the attackers had gained access to the cryptographic keys needed to decrypt sensitive client data. It was March of 2011, and security vendor RSA was the target of an attack that compromised sensitive data related to the company's flagship SecurID product. |
Guideline
|
|
|
|
2021-08-19 19:20:13 |
T-Mobile and BlackBerry: More Lessons Learned the Hard Way (lien direct) |
We learned this week that T-Mobile was the victim of a data breach that exposed data from tens of millions of customers, and then we found out that there is a flaw in BlackBerry's QNX operating system that puts hundreds of millions of devices at risk. These events don't impact everyone, but there are still lessons to be learned. |
|
|
|
|
2021-08-19 13:00:27 |
CISO Stories Podcast: Achieving Security Buy-In - Change Approach Not Culture (lien direct) |
We need the organization to support the cybersecurity initiatives and thus we try to influence the organization to support these goals for the protection of the organizational assets. If we are failing, is it that the organization did not 'get it' or was it our approach?
David Nolan, Vice President of Information Security at Aaron's, joins this podcast to discuss how to achieve that consensus - check it out... |
|
|
|
|
2021-08-18 16:43:59 |
BlackBerry QNX Vulnerability Highlights Lurking Issues with IOT Security (lien direct) |
BlackBerry revealed that its QNX operating system is vulnerable to the BadAlloc flaw revealed earlier this year. QNX is an embedded systems operating system that can be found in hundreds of millions of cars, as well as everything from critical infrastructure, to hospital devices, to equipment on the International Space Station. The disclosure highlights a lurking issue illustrating the much larger challenge we face when it comes to securing internet-of-things (IoT) and embedded systems like QNX. |
Vulnerability
|
|
|
|
2021-08-18 13:23:46 |
Three Reasons Why You Should Never Pay Ransomware Attackers (lien direct) |
After falling prey to a ransomware attack, most organizations are faced with the decision of whether they're going to pay the ransom demand. We'll save you some time: it's not worth it, and here are three of the many reasons why it does not pay to pay. |
Ransomware
|
|
|
|
2021-08-17 19:07:26 |
Analyst Report: How to Prepare for Ransomware Attacks (lien direct) |
Ransomware operations have evolved dramatically in recent months and years, and now leverage advanced tactics to infiltrate an organization. Security and risk management leaders need to look beyond just the endpoints to help protect the organization from ransomware. Fine-tuning incident response processes to specifically deal with ransomware is a key component for successful mitigation of these multi-stage attacks. |
Ransomware
Guideline
|
|
|
|
2021-08-17 17:51:52 |
T-Mobile Data Breach Amplifies Larger Cybersecurity Challenge (lien direct) |
Reports came out this week that T-Mobile had suffered a data breach. T-Mobile claims that the leak has been sealed. They deserve credit for responding quickly, but for some the damage may already be done. The data itself may not pose a direct risk to anyone, but the more information cybercriminals can obtain and correlate, the more effective future attacks will be. |
Data Breach
|
|
|
|
2021-08-17 12:51:03 |
XDR: The Key to Solving SIEM Shortcomings (lien direct) |
One of the mainstays of organizations' digital security postures is a Security Information and Event Management (SIEM) platform. According to CSO Online, SIEMs augment threat monitoring and incident response with log analysis. |
Threat
|
|
|
|
2021-08-16 12:04:08 |
(Déjà vu) Malicious Life Podcast: DeadRinger - Exposing Chinese APTs Targeting Major Telcos (lien direct) |
Cybereason recently discovered several previously unidentified attack campaigns targeting the telecoms industry across Southeast Asia that are assessed to be the work of multiple Chinese APT groups. The attacks are detailed in the threat intelligence report titled DeadRinger: Exposing Chinese Threat Actors Targeting Major Telcos. |
Threat
|
|
|
|
2021-08-12 17:03:00 |
LockBit Ransomware Wants to Hire Your Employees (lien direct) |
If I offer you a million dollars right now, would you betray your company and help me compromise their data? What if I told you that there is a ransomware group out there that is doing just that? Would you take the bait? Are you sure that others in your company won't be motivated to take that deal? |
Ransomware
|
|
|
|
2021-08-12 14:02:11 |
Accenture Responds Following LockBit Ransomware Attack (lien direct) |
Global IT consultancy company Accenture announced that it has fully restored its systems after experiencing a LockBit ransomware attack. On August 11, Accenture shared details about an incident involving some of their IT assets. |
Ransomware
|
|
|
|
2021-08-11 14:45:48 |
The Rising Threat from LockBit Ransomware (lien direct) |
LockBit ransomware is the latest threat posing an increased risk for organizations. The ransomware gang has been making headlines recently. LockBit has also reportedly compromised Accenture.
The group reportedly revealed the attack on their site on the DarkWeb, noting, “these people are beyond privacy and security. Hope their services are better than what I have seen inside. If you are interested in purchasing data sets, contact us.” |
Threat
Ransomware
|
|
|