Security breaches

INTRUSION Research Shows Confidence in Teams and Technologies to Thwart Cyberattacks Yet Cyber Breaches Still Commonplace Suggesting False Sense of Security

Retrieved on: 
Wednesday, August 4, 2021

PLANO, Texas and LAS VEGAS, Aug. 04, 2021 (GLOBE NEWSWIRE) -- INTRUSION, Inc. (Nasdaq: INTZ) today announced findings from a commissioned survey conducted in July about IT security decisionmakers’ false sense of security when it comes to neutralizing threats.

Key Points: 
  • Key takeaways from the survey include:
    Data breaches are too commonplace despite allocating significant portions of their IT budget to cybersecurity.
  • Ultimately, more than half (52%) reported a data breach at their organization at some time in the past.
  • Significant cyberattack concerns often remain even with formal response plans and the combination of staff and solutions being considered effective.
  • The survey addresses internal and external threats and reveals a sentiment of false security given the occurrences of data breaches.

NetWitness® Ransomware Defense Cloud Services Helps Enterprises Avoid and Mitigate the Impact of Ransomware Attacks

Retrieved on: 
Wednesday, August 4, 2021

Ransomware Defense Cloud Services also includes detection intelligence developed from in-depth ransomware research and development, combined with experienced threat hunting in enterprise environments.

Key Points: 
  • Ransomware Defense Cloud Services also includes detection intelligence developed from in-depth ransomware research and development, combined with experienced threat hunting in enterprise environments.
  • NetWitness Ransomware Defense Cloud Services addresses these needs by providing expert intelligence in a cloud solution backed by ransomware specialists, experienced threat hunters, and ongoing research and development.
  • NetWitness Ransomware Defense Cloud Services combine various areas of NetWitness expertise to help enterprises avoid headline-making ransomware incidents and are delivered through the cloud for rapid deployment.
  • NetWitness Ransomware Defense Cloud Services provide enhanced behavioral detection indicators based on advanced ransomware research and development, as well as insights from the NetWitness malware analysis lab.

Sophos Reports on Rampant Raccoon Stealer Campaign that Uses Telegram and Adds Cryptomining and Cryptocurrency Theft

Retrieved on: 
Tuesday, August 3, 2021

However, in the campaign Sophos investigated, it is distributed through droppers that the operators disguised as cracked software installers.

Key Points: 
  • However, in the campaign Sophos investigated, it is distributed through droppers that the operators disguised as cracked software installers.
  • These droppers bundle Raccoon Stealer with additional attack tools, including malicious browser extensions, YouTube click-fraud bots, and Djvu/Stop, a ransomware targeted primarily at home users.
  • The operators behind this Raccoon Stealer campaign also used the Telegram chat service for the first time for command-and-control communications, according to Sophos researchers.
  • Sophos Intercept X protects users by detecting the actions and behaviors of malware like Raccoon Stealer, including scanning for suspicious activity in memory and protecting against fileless malware.

Cado Security Unveils Cloud Memory Forensics For Enhanced Visibility and Context Across Data Breaches

Retrieved on: 
Tuesday, August 3, 2021

Many of today’s sophisticated hackers leverage techniques that run in memory only -- such as fileless malware, rootkits and process hollowing -- which leave no traces when data logs and host information are analyzed. If security teams aren’t able to capture evidence in memory, these attacks are extremely challenging to investigate. The Cado Response platform empowers security teams to investigate such attacks by automating memory capture and processing as soon as malicious activity is detected. Further, the Cado Response platform allows forensics experts to analyze memory alongside other critical data sources including disk information and cloud logs in a single pane of glass so they can easily grasp the full extent of what happened.

Key Points: 
  • With Memory Forensics, security teams gain enhanced visibility and context to identify the root cause of incidents and respond to data breaches faster.
  • By incorporating memory acquisition and processing capabilities directly in our Cado Response platform, security experts gain additional context and visibility into an attackers activities, further empowering them to investigate and respond to breaches at cloud speed.
  • The Cado approach provides security teams with 100% of the data and information they need to respond to breaches faster.
  • By automating data capture and processing across cloud and container environments, Cado Response enables security teams to effectively investigate and respond to cyber incidents at cloud speed.

80% of Global Organizations Expect to Experience a Breach of Customer Records in the Next Year

Retrieved on: 
Tuesday, August 3, 2021

According to a new survey, 80% of global organizations report they are likely to experience a data breach that impacts customer data in the next 12 months.

Key Points: 
  • According to a new survey, 80% of global organizations report they are likely to experience a data breach that impacts customer data in the next 12 months.
  • The CRI is based on a numerical scale of -10 to 10, with -10 representing the highest level of risk.
  • The current global index stands at -0.42, a slight increase on last year which indicates an "elevated" risk.
  • Organizations ranked the top three negative consequences of an attack as customer churn, lost IP and critical infrastructure damage/disruption.

KELA's "All Access Pass: Five Trends with Initial Access Brokers" Report Reveals the Inner Workings of the Ransomware-as-a-Service Ecosystem

Retrieved on: 
Monday, August 2, 2021

KELA's newly released research report, "All Access Pass: Five Trends with Initial Access Brokers," includes an in-depth analysis of Initial Access Brokers (IAB) and their activity for a full year from July 1, 2020 to June 30, 2021.

Key Points: 
  • KELA's newly released research report, "All Access Pass: Five Trends with Initial Access Brokers," includes an in-depth analysis of Initial Access Brokers (IAB) and their activity for a full year from July 1, 2020 to June 30, 2021.
  • A proven link between initial access listings and ransomware attacks that were executed and publicly announced.
  • Now, as the economy continues to grow, there are not only new trends emerging amongst existing IABs, but many new sellers entering the zone.
  • In the last year, IABs have become key components of the ransomware-as-a-service ecosystem, making malicious network access easy and lucrative for many of today's leading attacks.

KELA's "All Access Pass: Five Trends with Initial Access Brokers" Report Reveals the Inner Workings of the Ransomware-as-a-Service Ecosystem

Retrieved on: 
Monday, August 2, 2021

TEL AVIV, Israel, Aug. 2, 2021 /PRNewswire/ -- KELA, the global leader in actionable threat intelligence, today announced the launch of brand new research along with LUMINT, a new offering providing users with a glimpse into KELA's latest intelligence insights from the dark web including newly listed ransomware attacks, compromised network accesses for sale in cybercrime forums, leaked databases and data dumps, and updates on trending cybercrime threats. KELA's newly released research report, "All Access Pass: Five Trends with Initial Access Brokers," includes an in-depth analysis of Initial Access Brokers (IAB) and their activity for a full year from July 1, 2020 to June 30, 2021.

Key Points: 
  • KELA's newly released research report, "All Access Pass: Five Trends with Initial Access Brokers," includes an in-depth analysis of Initial Access Brokers (IAB) and their activity for a full year from July 1, 2020 to June 30, 2021.
  • A proven link between initial access listings and ransomware attacks that were executed and publicly announced.
  • Now, as the economy continues to grow, there are not only new trends emerging amongst existing IABs, but many new sellers entering the zone.
  • In the last year, IABs have become key components of the ransomware-as-a-service ecosystem, making malicious network access easy and lucrative for many of today's leading attacks.

Federman & Sherwood Announces the Filing of a Class Action On Behalf of ClearBalance Data Breach Victims

Retrieved on: 
Wednesday, July 28, 2021

Federman & Sherwood announces that it has filed a class action on behalf of ClearBalance customers whose confidential information was disclosed to cybercriminals during a data breach involving ClearBalances email accounts.

Key Points: 
  • Federman & Sherwood announces that it has filed a class action on behalf of ClearBalance customers whose confidential information was disclosed to cybercriminals during a data breach involving ClearBalances email accounts.
  • ClearBalance was unaware of the security breach until April 26, 2021, after the criminals had already attempted to commit wire fraud.
  • If you received notice of the data breach or have determined that your personal information was comprised, please contact Federman & Sherwood.
  • To learn how to participate in this action, please visit
    The lawsuit seeks to recover damages on behalf of all ClearBalance customers who were affected by the data breach.

Scott Cole & Associates Announces U.C. San Diego Health Data Breach Investigation

Retrieved on: 
Wednesday, July 28, 2021

San Diego on claims of negligence and invasion of privacy arising out of the health care facilitys recent high-profile data breach.

Key Points: 
  • San Diego on claims of negligence and invasion of privacy arising out of the health care facilitys recent high-profile data breach.
  • The volume of data admittedly gathered in this attack is shocking, says Scott Cole, the principal attorney at the investigating firm.
  • Scott Cole & Associates is collecting all available information regarding this latest cyber-attack and is interested in learning how it affected the patients, employees and students of U.C.
  • Since its inception in 1992, Scott Cole & Associates has litigated countless matters against businesses of all types, and in nearly every industry imaginable.

Titaniam Joins Palo Alto Networks Cortex XSOAR Marketplace

Retrieved on: 
Wednesday, July 28, 2021

LOS GATOS, Calif., July 28, 2021 /PRNewswire-PRWeb/ -- Titaniam, Inc., an innovator in data protection, ransomware, and extortion defense, today announced that Titaniam Protect is now available on the Palo Alto Networks Cortex XSOAR Marketplace, the industry's largest and most comprehensive security orchestration marketplace.

Key Points: 
  • LOS GATOS, Calif., July 28, 2021 /PRNewswire-PRWeb/ -- Titaniam, Inc., an innovator in data protection, ransomware, and extortion defense, today announced that Titaniam Protect is now available on the Palo Alto Networks Cortex XSOAR Marketplace, the industry's largest and most comprehensive security orchestration marketplace.
  • The content pack helps to automate data privacy protection from ransomware, extortion, and data breaches by dynamically encrypting and decrypting sensitive data within Cortex XSOAR.
  • "A robust, open ecosystem is at the heart of Cortex XSOAR," said Rishi Bhargava, VP of Product Strategy for Cortex XSOAR at Palo Alto Networks.
  • "We are proud to welcome Titaniam to the Cortex XSOAR Marketplace ecosystem, which has 700+ integrations.