It’s Near-Unanimous: AI, ML Make the SOC Better

November 20, 2024 at 04:30PM A recent Dark Reading survey reveals that 91% of cybersecurity professionals believe AI and machine learning have enhanced their security operations. Key benefits include improved threat detection, reduced false positives, and increased efficiency. These tools are positively impacting enterprise security, streamlining processes, and improving response times for security teams. ### … Read more

Fintech giant Finastra investigates data breach after SFTP hack

November 20, 2024 at 03:58PM Finastra confirmed a cybersecurity incident involving compromised credentials on November 7, 2024, with a threat actor selling stolen data. An investigation shows no evidence of broader breaches beyond their Secure File Transfer Platform. The impact assessment is ongoing, and affected clients will be contacted directly. Finastra previously faced a ransomware … Read more

DeepTempo Launches AI-Based Security App for Snowflake

November 20, 2024 at 07:59AM DeepTempo launched Tempo, a deep learning Snowflake Native App, enhancing security productivity and threat detection. Tempo optimizes existing security data lakes, detects anomalies, and provides context for triage. Organizations can save significantly on SIEM costs, with false positive rates below one percent, enabling efficient incident response and log management. ### … Read more

Phishing emails increasingly use SVG attachments to evade detection

November 17, 2024 at 11:37AM Threat actors are increasingly using Scalable Vector Graphics (SVG) files for phishing and malware distribution due to their ability to evade detection. Unlike traditional image formats, SVGs use code to create images and can embed JavaScript, allowing attackers to hide malicious content. Users should treat unexpected SVG attachments as suspicious. … Read more

Fake AI video generators infect Windows, macOS with infostealers

November 16, 2024 at 03:20PM Fake AI image and video generator websites are distributing Lumma Stealer for Windows and AMOS for macOS, both designed to steal credentials and cryptocurrency wallets. These sites impersonate a legitimate application, EditProAI, leading users to malicious downloads. Users should reset compromised passwords and enable multi-factor authentication. ### Meeting Takeaways 1. … Read more

Palo Alto Networks Confirms New Firewall Zero-Day Exploitation

November 15, 2024 at 05:05AM Palo Alto Networks has confirmed the exploitation of a zero-day vulnerability in its firewall, following investigations into claims of a remote code execution flaw. The announcement highlights ongoing security concerns related to the vulnerability. **Meeting Takeaways:** 1. **Zero-Day Confirmation**: Palo Alto Networks has confirmed that a zero-day vulnerability is being … Read more

20% of Industrial Manufacturers are Using Network Security As a First Line of Defense

November 13, 2024 at 05:36PM A recent ABI Research survey found that industrial manufacturers prioritize network security for cybersecurity investments due to increasing cyber threats and regulatory pressures. With a projected $2 billion market for cybersecurity solutions in 2024, focus areas include authentication, access control, and threat detection to mitigate risks from cyber events. ### … Read more

5 Ways to Save Your Organization From Cloud Security Threats

November 13, 2024 at 04:22PM Post-pandemic, organizations face challenges in cloud security due to its complexity, shared responsibility, and rise in multi-cloud usage. Attackers are using advanced technologies to exploit vulnerabilities. A proactive approach is essential, focusing on reducing attack surfaces, centralized threat investigation, tackling shadow IT, and emphasizing identity-based security for effective risk management. … Read more

Free Decryptor Released for BitLocker-Based ShrinkLocker Ransomware Victims

November 13, 2024 at 09:46AM Bitdefender has launched a free decryptor for ShrinkLocker ransomware, allowing data recovery following an analysis of the malware’s operations. The ransomware uses BitLocker for encryption and exploits trusted relationships to infiltrate systems. Recommendations for organizations include proactive monitoring and configuring BitLocker policies to mitigate risks. ### Meeting Takeaways 1. **Bitdefender’s … Read more

5 Ways Behavioral Analytics is Revolutionizing Incident Response

November 12, 2024 at 07:03AM Behavioral analytics is evolving from a threat detection tool to a crucial technology for enhancing incident response in cybersecurity. By automating post-detection insights, it reduces false positives, speeds up investigations, and improves accuracy. This shift allows security teams to efficiently triage alerts and allocate resources while leveraging AI-driven solutions. ### … Read more