Cybersecurity Compass: An Integrated Cyber Defense Strategy

August 2, 2024 at 03:20PM The Cybersecurity Compass, initially designed for CISOs, has evolved to benefit various cybersecurity professionals and stakeholders, offering strategic guidance and direction. It employs a metaphorical framework, aiming to fortify organizations against cyber threats and assist in incident response. The shift to a more inclusive approach reflects a broader applicability within … Read more

Microsoft: Azure DDoS Attack Amplified by Cyber Defense Error

July 31, 2024 at 03:18PM Microsoft cited an implementation error that worsened a DDoS attack, disrupting its Azure cloud services for about 8 hours. The attack impacted various Azure services and was described as causing service errors, timeouts, and latency increases. The company stated it’s internally investigating the incident and plans to release a Preliminary … Read more

Chinese Hackers Target Japanese Firms with LODEINFO and NOOPDOOR Malware

July 31, 2024 at 07:27AM Japanese organizations are targeted by a Chinese nation-state threat actor using malware like LODEINFO and NOOPDOOR to steal sensitive data, with Israeli cybersecurity company Cybereason tracking the campaign as Cuckoo Spear, related to APT10. The group uses spear-phishing emails and targets public-facing applications for data exfiltration, maintaining persistence for years. … Read more

Hot topics: Can’t-miss sessions at Mandiant’s 2024 mWISE event

July 24, 2024 at 10:24AM Register for mWISE™, a cybersecurity conference by Mandiant, now part of Google Cloud, in Denver on September 18-19, 2024. The session catalog is available, featuring nine content tracks. Highlights include new tracks on AI and cybersecurity, and a Next Gen CISO track. Register by August 12 to save $300. Sponsored … Read more

New Play ransomware Linux version targets VMware ESXi VMs

July 22, 2024 at 01:01PM Play ransomware, a new threat, has initiated targeted attacks on Linux devices, focusing on VMware ESXi virtual machines. This is a concerning development, expanding potential victims and ransom negotiation success. The gang’s tactics involve scanning and encrypting files, leading to significant disruptions in business operations and reduced data recovery options. … Read more

Kaspersky Is an Unacceptable Risk Threatening the Nation’s Cyber Defense

July 22, 2024 at 10:13AM The US federal government has announced a ban on Kaspersky software due to cybersecurity threats and its association with Russia, reinforcing concerns over foreign software supply chain threats. Geopolitical tensions are impacting cybersecurity, necessitating organizations to consider these implications in their cybersecurity strategies and collaborate for proactive threat intelligence to … Read more

BlueVoyant Unveils Edge Security Operations Platform

July 16, 2024 at 05:42PM BlueVoyant, a leading cybersecurity company, has launched an innovative Cyber Defense Platform integrating internal, external, and supply chain defense solutions. With AI-powered next-generation security operations, the platform offers detection & response, supply chain defense, digital risk protection, proactive defense, and cyber posture management. BlueVoyant has recently acquired Conquest Cyber and … Read more

Tracebit Raises $5 Million for Threat Deception Solution

July 11, 2024 at 12:21PM British startup Tracebit secures $5M seed-stage funding for cloud-based threat detection and deception tech. London-based company offers cloud-native threat deception technology to strengthen cybersecurity and expedite incident identification. Funding led by Accel, with support from Tapestry VC, 20SALES, and angel investors. Tracebit’s product uses canaries to enhance threat detection, plans … Read more

Google Targets Passkey Support to High-Risk Execs, Civil Society

July 10, 2024 at 06:05AM Google is extending the Advanced Protection Program (APP) by adding support for passkeys in an effort to enhance online account security for high-risk individuals. Passkeys, a virtual form of the FIDO2 hardware security key scheme, provide a more secure method of authentication and can help thwart phishing and adversary-in-the-middle attacks. … Read more

China’s APT40 gang is ready to attack vulns within hours or days of public release.

July 8, 2024 at 10:37PM Law enforcement agencies, led by Australia, have issued an advisory detailing the tradecraft of APT40, a state-sponsored cyber group aligned with China. Known for rapidly exploiting new vulnerabilities, APT40 targets unpatched networks and uses compromised devices to launch attacks. The advisory provides mitigation tactics and highlights APT40’s use of web … Read more