Threat

SonicWall Data Reveals the Top Five Most Widespread Network Attacks Used Against Small Businesses

Retrieved on: 
Martedì, Aprile 30, 2024

MILPITAS, Calif., April 30, 2024 /PRNewswire/ -- A review of SonicWall telemetry data suggests that the most widespread network attacks to small businesses (SMBs) are older vulnerabilities with a large amount of publicly available information and affecting major vendors. In light of this data, prioritization is a critically important factor for today's CISOs who are asked to manage and prioritize risk. 

Key Points: 
  • In light of this data, prioritization is a critically important factor for today's CISOs who are asked to manage and prioritize risk.
  • "In order to properly prioritize threats, we must first understand what attacks, vulnerabilities, and tactics are being used by our enemies," said SonicWall Executive Director of Threat Research Doug McKee.
  • "Relying too heavily on one factor (e.g., CVSS scores) can lead to an incomplete view of the risk associated with a vulnerability.
  • From January 2022 to March 2024, using SonicWall IPS data, SonicWall determined the most widespread attacks against small businesses.

GuidePoint Security Offers IoT Security Assessments to Identify Weaknesses and Vulnerabilities along with Tailored Remediation Recommendations

Retrieved on: 
Martedì, Aprile 16, 2024

GuidePoint Security’s team of IoT security and embedded systems experts have extensive experience identifying potential weaknesses in IoT devices and applications across a wide range of industries.

Key Points: 
  • GuidePoint Security’s team of IoT security and embedded systems experts have extensive experience identifying potential weaknesses in IoT devices and applications across a wide range of industries.
  • Organizations that leverage GuidePoint’s targeted IoT Security Assessment can ultimately identify and fix vulnerabilities, fortify their defenses, inspire confidence in their customers, and prevent unwanted access to their IoT ecosystem.
  • Key benefits of GuidePoint’s IoT Security Assessment include:
    IoT Network Security - assessment of an organization’s IoT ecosystem services and functions to identify insecure protocols, misconfigurations, vulnerabilities in device operations and custom network protocols.
  • IoT Firmware Security - review of an IoT device’s firmware to identify vulnerabilities that could leave an organization’s network and customers open to attack, along with actionable remediation recommendations.

NetSPI Achieves Prestigious CBEST Accreditation, Solidifying Its Position as a Trusted Leader in Financial Services Security Testing

Retrieved on: 
Martedì, Aprile 2, 2024

LONDON, April 2, 2024 /PRNewswire/ -- NetSPI, the proactive security solution, has announced its achievement of CBEST accreditation, marking a significant milestone in its commitment to delivering high-value penetration testing and red teaming services. CBEST, set by the Bank of England, represents one of the most rigorous security standards in the financial services industry. NetSPI's accreditation places it among the top echelons of security testing organisations across the globe.

Key Points: 
  • CBEST, set by the Bank of England, represents one of the most rigorous security standards in the financial services industry.
  • NetSPI's accreditation places it among the top echelons of security testing organisations across the globe.
  • NetSPI's success in this accreditation underscores its dedication to maintaining the highest standards of security testing and validation.
  • "Securing CBEST accreditation is a testament to NetSPI's unwavering commitment to excellence in cybersecurity," says Nick Walker, Regional Leader of EMEA at NetSPI.

BlackBerry Reports 1 Million Attacks on Global Financial Sector in 120 Days

Retrieved on: 
Giovedì, Marzo 14, 2024

WATERLOO, ON, March 14, 2024 /PRNewswire/ -- BlackBerry Limited (NYSE: BB; TSX: BB) today released its latest Global Threat Intelligence Report, revealing threat actors focusing efforts on targeting high-value data held by the global financial sector, with one million attacks logged over the 120 day period. This "death by a million cuts" is revealed to be using mainly commodity malware, which indicates a large number of independent actors targeting the industry in pursuit of financial gain. Critical infrastructure attacks, including those targeting government, financial, healthcare and communications industries, altogether accounted for 62 percent of industry-related attacks over the report period, September to December 2023.

Key Points: 
  • WATERLOO, ON, March 14, 2024 /PRNewswire/ -- BlackBerry Limited (NYSE: BB; TSX: BB) today released its latest Global Threat Intelligence Report , revealing threat actors focusing efforts on targeting high-value data held by the global financial sector, with one million attacks logged over the 120 day period.
  • Critical infrastructure attacks, including those targeting government, financial, healthcare and communications industries, altogether accounted for 62 percent of industry-related attacks over the report period, September to December 2023.
  • Overall, BlackBerry® cybersecurity solutions stopped 31 attacks every minute, a 19 percent increase on the last reporting period.
  • Download a copy of BlackBerry's Global Threat Intelligence Report at BlackBerry.com , and register to attend our Global Threat Intelligence Report Deep Dive webinar on March 26 to discover more.

Deepwatch Hires Curt Aubley as Chief Operating Officer and Chief Product Officer to Deliver the Next Generation of Its Managed Security Platform

Retrieved on: 
Martedì, Febbraio 27, 2024

Deepwatch , the leading managed security platform for the cyber resilient enterprise, today announced that Curt Aubley has joined its executive team as Chief Operating Officer and Chief Product Officer.

Key Points: 
  • Deepwatch , the leading managed security platform for the cyber resilient enterprise, today announced that Curt Aubley has joined its executive team as Chief Operating Officer and Chief Product Officer.
  • In this role, Aubley will lead the product and security operations teams, including delivering the next generation of the Deepwatch platform to include AI-driven capabilities as well as open, seamless integrations with a wide array of customer’s data sources.
  • “We’re extremely excited about Curt joining Deepwatch; he brings strong and proven expertise in security operations, product innovation and defeating adversaries,” said Charlie Thomas, CEO of Deepwatch.
  • Aubley is a former US Army officer and combat veteran.

Global Aerospace Valves Strategic Industry Report 2024: Market to Reach $15.4 Billion by 2030 - Additive Manufacturing and 3D Printing Enter the Fasteners Ecosystem - ResearchAndMarkets.com

Retrieved on: 
Giovedì, Febbraio 15, 2024

Global Commercial Airline Revenues (in US$ Billion) for the Years 2010.

Key Points: 
  • Global Commercial Airline Revenues (in US$ Billion) for the Years 2010.
  • 2015, 2020, and 2025
    Global Aircraft Deliveries by Region: 2021-2040
    Global Commercial Aircraft Fleet Projections: Breakdown of Fleet (in Units) by Region for 2019 and 2040
    As the World Steps Up Military Spending in the Wake of the Russia Ukraine War, Military Grade Aerospace Valves are Poised to Benefit from the Unfortunate State of Global Geo-Political Affairs
    Germany's Historic Military Investments in 2022 Exemplifies the Prevailing Global Sentiment that the World is a Dangerous Place Where the Threat of Authoritarian States Can be Resisted Only With Big-Ticket Military Capabilities: Military Spending by Top Countries in 2022 (E) (In US$ Billion)
    Rising Demand for Fixed Wing Fighter Aircraft: A Favorable Scenario for Aerospace Valves Market

Cequence Reveals Love Bots are on the Loose Ahead of Valentine’s Day

Retrieved on: 
Martedì, Febbraio 13, 2024

Cequence Security today released new research ahead of Valentine’s Day that found scammers are increasingly active on dating apps, attempting to manipulate and exploit users for financial gain.

Key Points: 
  • Cequence Security today released new research ahead of Valentine’s Day that found scammers are increasingly active on dating apps, attempting to manipulate and exploit users for financial gain.
  • These deceptive individuals pose as genuine romantic interests, building emotional connections before attempting to extract money from unsuspecting individuals.
  • Developed by the Cequence CQ Prime Threat Research Team, the report analyzed anonymized 2023 traffic and attack data across multiple customers in the dating and media vertical across all geographies.
  • The CQ Prime team identified and categorized active threats, and the resulting threat intelligence is a foundational element of Cequence products that enable mitigation and blocking to protect customers’ businesses.

Pwn2Own Automotive 2024: VicOne and ZDI lead first hackathon to uncover cyber vulnerabilities in connected vehicles

Retrieved on: 
Mercoledì, Gennaio 31, 2024

(Photo: Business Wire)

Key Points: 
  • (Photo: Business Wire)
    The event was dedicated to discovering and fixing digital security vulnerabilities of connected cars to protect the cybersecurity of vehicles.
  • A total of 49 unknown security vulnerabilities (zero-day vulnerabilities) were discovered by the participants over the three days.
  • VicOne will continue to host this event, and I hope to see everyone again at 2025 Pwn2Own Automotive Tokyo."
  • For more updates on the Pwn2Own Automotive and future Pwn2Own hacking events, follow the social media accounts and blog posts from VicOne ( LinkedIn , X , blog ) and ZDI ( LinkedIn , X , blog ).

N2K and Unit 42 by Palo Alto Networks expand Threat Vector into a standalone podcast on N2K media network

Retrieved on: 
Giovedì, Gennaio 11, 2024

FULTON, Md., Jan. 11, 2024 /PRNewswire/ -- N2K, a leader in strategic cyber workforce intelligence, and Palo Alto Networks® Unit 42® announced today the launch of their standalone podcast, Threat Vector , on the N2K media network, building on the success of their bi-weekly segment on the CyberWire Daily podcast.

Key Points: 
  • FULTON, Md., Jan. 11, 2024 /PRNewswire/ -- N2K, a leader in strategic cyber workforce intelligence, and Palo Alto Networks® Unit 42® announced today the launch of their standalone podcast, Threat Vector , on the N2K media network, building on the success of their bi-weekly segment on the CyberWire Daily podcast.
  • The Threat Vector podcast will take a deeper dive into unraveling the complex and constantly evolving cyberthreat landscape through discussions, expert interviews, and insightful analysis.
  • The Threat Vector podcast will provide a platform for in-depth discussions and expert analysis from threat intelligence experts, incident responders, and proactive security consultants.
  • To hear the latest Unit 42 Threat Vector podcast episode, subscribe wherever you get your favorite shows or visit the show page on the N2K media network for more information.

WatchGuard Threat Lab Report Shows Rise in Threat Actors Exploiting Remote Access Software

Retrieved on: 
Mercoledì, Dicembre 6, 2023

Key findings from the data show increasing instances of remote access software abuse, the rise of cyber adversaries using password-stealers and info-stealers to thieve valuable credentials, and threat actors pivoting from utilizing scripting to employing other living-off-the-land techniques to initiate an endpoint attack.

Key Points: 
  • Key findings from the data show increasing instances of remote access software abuse, the rise of cyber adversaries using password-stealers and info-stealers to thieve valuable credentials, and threat actors pivoting from utilizing scripting to employing other living-off-the-land techniques to initiate an endpoint attack.
  • “Modern security platforms that include firewalls and endpoint protection software can deliver enhanced protection for networks and devices.
  • These findings indicate to Threat Lab researchers that threat actors continue to utilize multiple living-off-the-land techniques, likely in response to more protections around PowerShell and other scripting.
  • For a more in-depth view of WatchGuard’s research, read the complete Q3 2023 Internet Security Report here: https://www.watchguard.com/wgrd-resource-center/security-report-q3-2023 .