Recent Security News

  • Navigating Biometric Data Security Risks in the Digital Age

    March 5, 2024 at 10:02AM Summary: Biometrics, though dating back to 1901, has significantly evolved with widespread use in public and private sectors. However, there are security risks, as shown by gaps in the US DoD’s biometrics data management. Enterprises also face data theft and privacy concerns, emphasizing the need for robust security policies and…

    Read More

  • Axonius Banks $200 Million in Late-Stage FundingĀ 

    March 5, 2024 at 09:48AM Axonius, a leading player in attack surface management, secured $200 million in late-stage funding, bringing its total raised to $600 million. The Series E extension was led by existing investors and aimed to accelerate global expansion. The company provides a cybersecurity asset management product and has achieved $100 million in…

    Read More

  • Investment Firm Team8 Raises Additional $500 Million

    March 5, 2024 at 09:48AM Investment firm Team8 raised $500 million, bringing its total assets to over $1 billion. It specializes in venture creation and venture capital, with a focus on cybersecurity and expanding into data, AI, fintech, and digital health. The new funds will be divided into three separate funds, supporting its unique venture…

    Read More

  • Cybersecurity M&A Roundup: 27 Deals Announced in February 2024

    March 5, 2024 at 09:48AM In February 2024, twenty-seven cybersecurity-related merger and acquisition deals were announced, including notable acquisitions such as 1Password acquiring Kolide, Armis acquiring CTCI for $20 million, and Cohesity’s $3 billion purchase of Veritas’ data protection business. Other deals involved companies such as F5, Resilience, and Spirit Technology Solutions. It seems that…

    Read More

  • ScreenConnect flaws exploited to drop new ToddlerShark malware

    March 5, 2024 at 09:39AM North Korean APT group Kimsuky exploits ScreenConnect flaws CVE-2024-1708 and CVE-2024-1709 to spread new malware variant ToddlerShark. The group uses legitimate Microsoft binaries, registry modifications, and scheduled tasks for persistent access and data exfiltration. ToddlerShark, a polymorphic malware, exhibits evasion techniques, making detection and analysis challenging. Kroll plans to share…

    Read More