Ransomware gangs are paying attention to infostealers, so why aren’t you?

February 29, 2024 at 11:37AM Cybercriminals are increasingly using infostealers to acquire online account passwords and sensitive data to gain access to organizations’ IT environments for deploying ransomware. Notorious ransomware gangs such as LockBit and Trickbot/Conti are interested in obtaining and using infostealers, while the market for stolen credentials gathered by these malware has surged. … Read more

Is XDR Enough? The Hidden Gaps in Your Security Net

February 28, 2024 at 07:45AM Enterprise networks have evolved significantly, with data and applications now spanning a complex array of multi-cloud, on-premises, and legacy infrastructures. Traditional security tools struggle to provide complete visibility amidst this complexity. Extended detection and response (XDR) aims to address these challenges by offering consolidated visibility and advanced threat detection mechanisms, … Read more

Intel Core Ultra vPro Platform Brings New Security Features

February 28, 2024 at 07:45AM Intel announced new security features with the latest vPro platform and premium Core Ultra processors, including AI capabilities and hardware-based authentication. The Silicon Security Engine secures devices against firmware threats, while Device Health goes beyond Microsoft’s Secured PC Core requirement. Threat Detection Technology now uses NPU-assisted anomaly detection, and Hardware … Read more

Artificial Arms Race: What Can Automation and AI do to Advance Red Teams

February 27, 2024 at 07:27AM The text discusses the significance of Red Teams for security stress tests and outlines their current state-of-the-art. It emphasizes the need for a well-defined security program and the role of human operators. It also explores the potential of automation and AI in Red Team engagements, such as asset discovery, ransomware … Read more

Fostering Collaboration for Standardized Threat Investigation & Response

February 23, 2024 at 10:06AM Summary: The Open Cybersecurity Schema Framework (OCSF) aims to address data interoperability issues in security by providing a standard for collecting and managing security data across different tools. To achieve widespread adoption, industry collaboration, customer engagement, vendor cooperation, federal support, and promotion of enterprise use cases are essential. This initiative … Read more

New Qbot malware variant uses fake Adobe installer popup for evasion

February 15, 2024 at 08:29AM New QBot malware variants have been detected in email campaigns since mid-December, indicating ongoing development and distribution. The malware, also known as Qakbot, deploys through fake Adobe product installers and has caused significant financial damages in the past. Security researchers are closely monitoring the evolving threat and updating detection rules. … Read more

Hands-On Review: SASE-based XDR from Cato Networks

February 5, 2024 at 08:45AM XDR platforms help companies detect threats by correlating indicators from security domains. Cato Networks’ “SASE-based” XDR leverages native sensors to provide detailed threat analysis. Through intuitive dashboards, analysts can assess and mitigate threats, ultimately simplifying incident response. Cato’s streamlined approach demonstrates a commitment to enhancing threat detection and response capabilities. … Read more

Prevent BEC with AI-Powered Email and Collaboration

January 26, 2024 at 07:58PM The Trend Vision One™ platform integrates AI-powered email and collaboration security to address the growing need for streamlined IT and security operations. It provides comprehensive threat protection, detection, and response across email, users, endpoint, cloud, and network, with centralized visibility and management. It also enables proactive containment of threats and … Read more

Role of Wazuh in building a robust cybersecurity architecture

January 26, 2024 at 10:28AM Cybersecurity architecture is crucial for organizations to secure their information systems against cyber threats. Leveraging open source solutions and tools can offer cost-effective, flexible, and transparent benefits. Wazuh, a free and open source security solution, plays a significant role in implementing cybersecurity architecture by offering unified XDR and SIEM protection, … Read more

Nozomi Unveils Wireless Security Sensor for OT, IoT Environments 

January 26, 2024 at 05:15AM Nozomi Networks has launched Guardian Air, a security sensor for detecting wireless threats in OT and IoT environments. The product monitors various frequencies associated with wireless protocols and sends data to a cloud-based system for analysis. It provides visibility at the wireless level and is designed to be integrated into … Read more