Malware

FortiGuard Labs Reports Destructive Wiper Malware Increases Over 50%

Retrieved on: 
Wednesday, February 22, 2023

Highlights of the 2H 2022 report follow:

Key Points: 
  • Highlights of the 2H 2022 report follow:
    The mass distribution of wiper malware continues to showcase the destructive evolution of cyberattacks.
  • Analyzing wiper malware data reveals a trend of cyber adversaries consistently using destructive attack techniques against their targets.
  • Later in the year, wiper malware expanded into other countries, fueling a 53% increase in wiper activity from Q3 to Q4 alone.
  • FortiGuard Labs looked at the functionality of detected malware based on sandbox data to track the most common delivery approaches.

CyberRatings.org Announces New Web Browser Test Results for 2022

Retrieved on: 
Tuesday, August 16, 2022

AUSTIN, Texas, Aug. 16, 2022 /PRNewswire/ -- CyberRatings.org, the non-profit entity dedicated to providing transparency on cybersecurity product efficacy, has published the results of its 2022 Web Browser Security Test. Google Chrome, Microsoft Edge, and Mozilla Firefox were tested for Phishing Protection and Malware Protection running on Windows 10 and 11.

Key Points: 
  • AUSTIN, Texas, Aug. 16, 2022 /PRNewswire/ -- CyberRatings.org, the non-profit entity dedicated to providing transparency on cybersecurity product efficacy, has published the results of its 2022 Web Browser Security Test.
  • Google Chrome, Microsoft Edge, and Mozilla Firefox were tested for Phishing Protection and Malware Protection running on Windows 10 and 11.
  • The reports include measurements of protection against fresh new attacks, consistency of protection over time, and how effective the browser protection was overall.
  • Consumers should not override the warnings offered by their web browser protection but instead take advantage of the free offering."

LookingGlass Cyber Expands Data Science Team to Drive AI and ML-Powered Products and Intelligence Analysis

Retrieved on: 
Tuesday, June 14, 2022

These new hires underscore the companys strategic objective to expand the use of applied data science within its products to enhance cyber threat intelligence analysis.

Key Points: 
  • These new hires underscore the companys strategic objective to expand the use of applied data science within its products to enhance cyber threat intelligence analysis.
  • Sherman joins LookingGlass as part of the recent acquisition of business intelligence and strategic advisory firm Next5 .
  • He has 25 years of software and data expertise, and previously founded the software development, design, and prototyping firm Stealthware.
  • Because intelligence is at the core of who we are, LookingGlass consumes immense amounts of threat intelligence every day.

Aurora Mobile Among First Batch of Companies to Pass CAICT’s SDK Security Test and Evaluation Campaign

Retrieved on: 
Wednesday, August 4, 2021

SHENZHEN, China, Aug. 04, 2021 (GLOBE NEWSWIRE) -- Aurora Mobile Limited (NASDAQ: JG) (Aurora Mobile or the Company), a leading mobile developer service provider in China, today announced that it was among the first batch of companies to pass the security test and evaluation under the SDK Security campaign, arranged by the China Academy of Information and Communications Technology (CAICT).

Key Points: 
  • SHENZHEN, China, Aug. 04, 2021 (GLOBE NEWSWIRE) -- Aurora Mobile Limited (NASDAQ: JG) (Aurora Mobile or the Company), a leading mobile developer service provider in China, today announced that it was among the first batch of companies to pass the security test and evaluation under the SDK Security campaign, arranged by the China Academy of Information and Communications Technology (CAICT).
  • From July 12 to July 31, 2021, the Security Research Institute of CAICT conducted its first round of the SDK security test and evaluation campaign.
  • Among the five companies that applied for the first round, four companies including Aurora Mobile, successfully completed and passed the SDK security test and evaluation.
  • Set in a standardized testing environment carried out by CAICT, this technical evaluation tested five aspects of SDK product security, including basic security of SDK products, data storage security, data interaction security, key component security, code and document security.

Former DOD Principal Director for Cyber Dr. Daniel J. “Rags” Ragsdale Joins Two Six Technologies

Retrieved on: 
Wednesday, August 4, 2021

Im thrilled to announce the addition of an accomplished military, DOD, and DARPA veteran like Rags to our leadership team, said Joe Logue, CEO of Two Six Technologies.

Key Points: 
  • Im thrilled to announce the addition of an accomplished military, DOD, and DARPA veteran like Rags to our leadership team, said Joe Logue, CEO of Two Six Technologies.
  • Rags reputation goes before him, and his unmatched experience and expertise in cyber and other sectors will have a significant impact on our organic growth and strategic expansion.
  • Previously, as Principal Director for Cyber, Ragsdale was responsible for coordinating cyber modernization efforts across the DOD.
  • Prior to his return to the DOD in early 2019, Ragsdale was the founding director of the Texas A&M Cybersecurity Center.

Proofpoint’s Annual Human Factor Report Reveals How 2020 Transformed Today’s Threat Landscape

Retrieved on: 
Wednesday, August 4, 2021

SUNNYVALE, Calif., Aug. 04, 2021 (GLOBE NEWSWIRE) -- Proofpoint, Inc. (NASDAQ: PFPT), a leading cybersecurity and compliance company,today unveiled its annual Human Factor report , which provides a comprehensive examination of the three main facets of user riskvulnerability, attacks, and privilegeand how the extraordinary events of 2020 transformed the current threat landscape.

Key Points: 
  • SUNNYVALE, Calif., Aug. 04, 2021 (GLOBE NEWSWIRE) -- Proofpoint, Inc. (NASDAQ: PFPT), a leading cybersecurity and compliance company,today unveiled its annual Human Factor report , which provides a comprehensive examination of the three main facets of user riskvulnerability, attacks, and privilegeand how the extraordinary events of 2020 transformed the current threat landscape.
  • Attackers dont hack in, they log in, and people continue to be the most critical factor in todays cyber attacks.
  • The threat ecosystem has evolved over the past year, and this report explores how a people-centric approach to cybersecurity can reduce todays risks, said Ryan Kalember, EVP of cybersecurity strategy, Proofpoint.
  • To download Proofpoints Human Factor 2021 report, please visit: https://www.proofpoint.com/us/resources/threat-reports/human-factor .

CYBER.ORG Releases First National K-12 Cybersecurity Learning Standards

Retrieved on: 
Wednesday, August 4, 2021

As the first national effort to align cybersecurity learning criteria across all 50 states, the K-12 cybersecurity learning standards aim to build a strong, more diverse talent pipeline to protect U.S. national security and maintain U.S. competitiveness on the world stage, while helping address the cybersecurity workforce shortage.

Key Points: 
  • As the first national effort to align cybersecurity learning criteria across all 50 states, the K-12 cybersecurity learning standards aim to build a strong, more diverse talent pipeline to protect U.S. national security and maintain U.S. competitiveness on the world stage, while helping address the cybersecurity workforce shortage.
  • The national K-12 cybersecurity learning standards are critical to providing the next generation of students with the skills and knowledge to pursue cybersecurity careers, ultimately helping solve the cybersecurity workforce gap, said Kevin Nolten, Director of Academic Outreach at CYBER.ORG.
  • The first-ever K-12 cybersecurity learning standards will support CYBER.ORGs mission to address the growing cybersecurity workforce crisis by increasing foundational cybersecurity awareness, access to cybersecurity education and interest in the cybersecurity profession.
  • The national K-12 cybersecurity learning standards will enable greater access to cybersecurity education in classrooms across the country, said Kirsten Baesler, North Dakota Superintendent of Public Instruction.

Orca Security Spearheads Effort to Elevate Transparency in the Cybersecurity Industry

Retrieved on: 
Wednesday, August 4, 2021

Orca Security today announced the launch of TransparencyInCyber.org , a new initiative to elevate transparency and drive open discussion in the cybersecurity industry.

Key Points: 
  • Orca Security today announced the launch of TransparencyInCyber.org , a new initiative to elevate transparency and drive open discussion in the cybersecurity industry.
  • We need to ask more cybersecurity companies to support honesty, and accessibility of product information to improve security for all.
  • Without cybersecurity transparency, the solutions organizations rely on for security, operations, management, marketing, development, and daily operations can be leveraged by threat actors against your environment.
  • Remediating risks is a top priority for security professionals and cybersecurity transparency ensures they are identified, rated, and ultimately tracked through closure.

NetWitness® Ransomware Defense Cloud Services Helps Enterprises Avoid and Mitigate the Impact of Ransomware Attacks

Retrieved on: 
Wednesday, August 4, 2021

Ransomware Defense Cloud Services also includes detection intelligence developed from in-depth ransomware research and development, combined with experienced threat hunting in enterprise environments.

Key Points: 
  • Ransomware Defense Cloud Services also includes detection intelligence developed from in-depth ransomware research and development, combined with experienced threat hunting in enterprise environments.
  • NetWitness Ransomware Defense Cloud Services addresses these needs by providing expert intelligence in a cloud solution backed by ransomware specialists, experienced threat hunters, and ongoing research and development.
  • NetWitness Ransomware Defense Cloud Services combine various areas of NetWitness expertise to help enterprises avoid headline-making ransomware incidents and are delivered through the cloud for rapid deployment.
  • NetWitness Ransomware Defense Cloud Services provide enhanced behavioral detection indicators based on advanced ransomware research and development, as well as insights from the NetWitness malware analysis lab.

Joe Slowik of Gigamon Named Winner of Top 10 Cybersecurity Experts for 2021 by Cyber Defense Magazine

Retrieved on: 
Wednesday, August 4, 2021

Slowik competed against many of the industrys leading cybersecurity experts for this prestigious award.

Key Points: 
  • Slowik competed against many of the industrys leading cybersecurity experts for this prestigious award.
  • Throughout his career, Slowik has touched just about every aspect of cybersecurity including roles as a threat hunter, intelligence professional, and detection engineer.
  • This is Cyber Defense Magazines 9th year of honoring cybersecurity innovators, in this case the Black Unicorn Awards for 2021 on our Cyber Defense Awards platform.
  • Cyber Defense Magazine is a proud member of the Cyber Defense Media Group (CDMG).