Navigate Up
Sign In

Information Security Feeds

Qualys at Black Hat USA 2017: Best practices and case study presentations
Fri, 21 Jul 2017 18:55:30 +0000
There will be no lack of interesting content from Qualys at Black Hat next week. Depending on you interests, you might want to make time for some of these talks and presentations at booth #899. Wednesday, July 26 10:20 AM – Achieving 2-Second Visibility with Qualys Cloud Agent Jimmy Graham, Director of Product Management, Qualys This talk focuses on how to use the Qualys Cloud Agent to enable instant, global visibility of IT assets including … More

Surprisingly stealthy botnet has been targeting users for years
Fri, 21 Jul 2017 16:31:04 +0000
ESET researchers have unearthed a botnet of some 500,000 infected machines engaged mostly in ad-related fraud by using malicious Chrome extensions, but also Facebook fraud and brute-forcing Joomla and WordPress websites. In addition to this, the compromised machines are also equipped with a fully featured backdoor, which allows the operators to spy on all the victims, and to download additional malware on the computers. A long-standing operation There are many unusual things about the so-called … More

Companies unprepared to measure incident response
Fri, 21 Jul 2017 15:00:48 +0000
Companies struggle to keep up with and respond to cyberattacks due to lack of resources, according to Demisto. For example, more than 40 percent of respondents said their organizations are not prepared to measure incident response, and only 14.5 percent of respondents are measuring MTTR (Mean Time to Respond). While organizations are hit with an average of nearly 350 incidents per week, 30 percent of respondents reported they have no playbooks, runbooks or other documentation … More

New infosec products of the week​: July 21, 2017
Fri, 21 Jul 2017 14:00:06 +0000
Awake Security unveils advanced security analytics solution Awake’s advanced security analytics provide security teams the insights needed to understand the scope and impact of observed behavior and investigate only credible alerts and threats. By cutting out cumbersome tasks during the investigative process, Awake enables analysts to focus on high-value security work, speeding the detection of insider threats, corporate espionage, lateral movement and data exfiltration. Lastline unveils breach protection capabilities Lastline Breach Defender provides a dynamic … More

Destruction of Service attacks could shut down organizations for good
Fri, 21 Jul 2017 13:20:16 +0000
The Cisco 2017 Midyear Cybersecurity Report (MCR) uncovers the rapid evolution of threats and the increasing magnitude of attacks, and forecasts potential Destruction of Service attacks, which could eliminate organizations’ backups and safety nets. Also, with the advent of the Internet of Things, key industries are bringing more operations online, increasing attack surfaces and the potential scale and impact of these threats. Targeted attacks and APTs are most critical concerns Cisco security researchers watched the … More

Every organization is only one click away from a potential compromise
Fri, 21 Jul 2017 13:00:15 +0000
Information security staffs are so single-minded about defending their organizations from external attack that they all but ignore a threat with vastly greater potential for damage, according to the SANS Institute. Looking for an easier target As security protecting organizations from outside attack gets more formidable, attackers look for easier targets – users who already have access to an organization’s most sensitive data, for example, and aren’t as hard to fool as security systems. “While … More

Whitepaper: Eight key pressures on security operations
Thu, 20 Jul 2017 23:00:35 +0000
Security operations have come under increasing pressure from well-funded attackers armed with news tactics, tools and skills. As a result of this, there is additional scrutiny, micromanagement and oversight as IT security climbs the business agenda of many organizations. It’s vital to have the right information at your disposal to describe your challenges and suggest solutions. These forces can be categorized as those from external sources, and those which your business places on you. In … More

Dark web Hansa Market shut down after being run for a month by law enforcement
Thu, 20 Jul 2017 21:38:37 +0000
Just a few short weeks after dark web market Alpha Bay was shut down, Hansa Market is now also shuttered. After Alpha Bay’s shutdown, many users flocked to Hansa Market, which was touted as the most secure on the dark web. As users are starting to congregate on Reddit to discover what is happening, Europol has released a confirmation of the market’s downfall. “Europol has been supporting the investigation of criminal marketplaces on the Dark … More

Apple patches critical Broadpwn vulnerability in its various OSes
Thu, 20 Jul 2017 20:03:24 +0000
Apple has released security updates for iOS, macOS (Sierra, El Capitan, and Yosemite), Safari, iCloud, iTunes, watchOS and tvOS. As per usual, the same fixed Webkit flaws abound in all of the updates, as it is the web browser engine used by Safari, App Store, and many other applications. Among the other plugged holes a few stand out, for various reasons: Among the WebKit flaws, there’s one disclosed to Apple by the UK’s National Cyber … More

Creating the security operations center of the future with Siemplify
Thu, 20 Jul 2017 18:54:41 +0000
Security operations teams are engaged in a constant struggle to keep up with the volume of security alerts, maintain the right skills, and manage incident response processes. They want quality information, presented in a way that makes it easy to grasp and react to quickly. They want not to be bogged down in security alerts, and not to spend precious time searching for information. They want every task that can be automated to be automated. … More