Malware

Osterman Research Software Supply Chain Study Finds 100 Percent of Commercial Applications Contain Vulnerable Software Components

Retrieved on: 
Wednesday, August 4, 2021

GrammaTech , a leading provider of application security testing products and software research services, today released the findings of a study conducted by Osterman Research into the state of software supply chain security.

Key Points: 
  • GrammaTech , a leading provider of application security testing products and software research services, today released the findings of a study conducted by Osterman Research into the state of software supply chain security.
  • The report found that 100% of commercial off the shelf (COTS) applications tested contained open source components with security vulnerabilities, among those 85% were critical.
  • Commercial off-the-shelf software applications often include open-source components, many of which contain a range of known vulnerabilities that can be exploited by malware, yet vendors often do not disclose their presence, said Michael Sampson, senior analyst, Osterman Research.
  • The near ubiquitous usage of such vulnerable components rendered comparisons between applications on this basis meaningless as all applications are seen as vulnerable.

Morphisec Upgrades Security Suite with Vulnerability Management Solution for Every Business

Retrieved on: 
Wednesday, August 4, 2021

LAS VEGAS, Aug. 4, 2021 /PRNewswire-PRWeb/ -- Morphisec , a leader in cloud-delivered endpoint and server security solutions, today released Morphisec Scout , a vulnerability management tool, at Black Hat USA .

Key Points: 
  • LAS VEGAS, Aug. 4, 2021 /PRNewswire-PRWeb/ -- Morphisec , a leader in cloud-delivered endpoint and server security solutions, today released Morphisec Scout , a vulnerability management tool, at Black Hat USA .
  • As the threat of cyber attacks targeting unpatched software vulnerabilities continues to rise and companies install-base increases, Morphisec Scout offers an automated, cloud-delivered solution.
  • With Morphisec Scout, cybersecurity professionals have the ability to:
    Gain the value of vulnerability management without needing to add extra agents or tax their endpoints.
  • Morphisec is the world leader in providing advanced security solutions for midsize to small enterprises around the globe.

Tugboat Logic Empowers BentoBox to Improve Security for Over 12,000 Restaurant Customers

Retrieved on: 
Wednesday, August 4, 2021

BURLINGAME, Calif., Aug. 4, 2021 /PRNewswire/ -- Tugboat Logic, the leading security assurance company, today announced that its customer, BentoBox, launched its first infosec program to provide security assurance to more than 12,000 restaurant locations worldwide.   

Key Points: 
  • BURLINGAME, Calif., Aug. 4, 2021 /PRNewswire/ -- Tugboat Logic, the leading security assurance company, today announced that its customer, BentoBox , launched its first infosec program to provide security assurance to more than 12,000 restaurant locations worldwide.
  • With Tugboat Logic's Security Assurance Platform, BentoBox gained:
    A cost-effective security program:With Tugboat Logic, BentoBox scoped out a security program designed to fit their immediate needs without breaking the bank including automated cybersecurity training for their team of 100+ employees.
  • Having a best-in-class solution like Tugboat Logic on our side enables us to be a stronger partner to the restaurant industry."
  • BentoBox's customers need them to be experts at security, and that's where Tugboat Logic comes in.

Cybersecurity Executive Search Firm Pinpoint Search Group Expands Operations Globally

Retrieved on: 
Wednesday, August 4, 2021

GRAND JUNCTION, Colo., Aug. 4, 2021 /PRNewswire-PRWeb/ --Pinpoint Search Group, a U.S.-based boutique executive search firm dedicated to placing tier one talent for cybersecurity vendors, has expanded its operations globally through a strategic partnership with FiveSix Partners, a U.K.-based specialist cybersecurity recruitment company.

Key Points: 
  • GRAND JUNCTION, Colo., Aug. 4, 2021 /PRNewswire-PRWeb/ --Pinpoint Search Group, a U.S.-based boutique executive search firm dedicated to placing tier one talent for cybersecurity vendors, has expanded its operations globally through a strategic partnership with FiveSix Partners, a U.K.-based specialist cybersecurity recruitment company.
  • Pinpoint tasked FiveSix with leading its recruitment efforts in Europe, the Middle East and Africa (EMEA).
  • Pinpoint Search Group is a boutique search firm dedicated to filling VP, Director and Sr.
  • CJ Arlotta, CJ Media Solutions for Pinpoint Search Group, +1 631-235-9126, [email protected]

Security Vendors' Financial and Operational Metrics Trends and Analysis Report 2021 - ResearchAndMarkets.com

Retrieved on: 
Wednesday, August 4, 2021

The "Security Vendors' Financial and Operational Metrics: Trends and Analysis" report has been added to ResearchAndMarkets.com's offering.

Key Points: 
  • The "Security Vendors' Financial and Operational Metrics: Trends and Analysis" report has been added to ResearchAndMarkets.com's offering.
  • This report is based on these data sets and highlights some of the key trends and developments in the cyber-security market in 2020 and 1H 2021.
  • Cyber-security vendors revenue tracker and Cyber-security-related tracker provide details of security vendors financial and operational metrics and activity, respectively.
  • An overview of the recent financial performance of major publicly traded security vendors (with a focus on revenue, revenue growth and operating profitability)
    An analysis of the current market capitalisations of selected major publicly traded security vendors.

Sophos Reports on Rampant Raccoon Stealer Campaign that Uses Telegram and Adds Cryptomining and Cryptocurrency Theft

Retrieved on: 
Tuesday, August 3, 2021

However, in the campaign Sophos investigated, it is distributed through droppers that the operators disguised as cracked software installers.

Key Points: 
  • However, in the campaign Sophos investigated, it is distributed through droppers that the operators disguised as cracked software installers.
  • These droppers bundle Raccoon Stealer with additional attack tools, including malicious browser extensions, YouTube click-fraud bots, and Djvu/Stop, a ransomware targeted primarily at home users.
  • The operators behind this Raccoon Stealer campaign also used the Telegram chat service for the first time for command-and-control communications, according to Sophos researchers.
  • Sophos Intercept X protects users by detecting the actions and behaviors of malware like Raccoon Stealer, including scanning for suspicious activity in memory and protecting against fileless malware.

ISA Cybersecurity and Proofpoint join forces to deliver email “security-as-a-service”

Retrieved on: 
Tuesday, August 3, 2021

TORONTO, Aug. 03, 2021 (GLOBE NEWSWIRE) -- ISA Cybersecurity today announced that it is now delivering Proofpoints industry-leading secure email solutions as a managed service offering.

Key Points: 
  • TORONTO, Aug. 03, 2021 (GLOBE NEWSWIRE) -- ISA Cybersecurity today announced that it is now delivering Proofpoints industry-leading secure email solutions as a managed service offering.
  • ISA Cybersecurity was named Proofpoints Fastest-growing Canadian Regional Partner of 2020 earlier this year, and is recognized as a Proofpoint Trusted Partner, confirming ISA Cybersecuritys reputation of success in working with customers on their Proofpoint implementations.
  • We have years of experience working together to deliver Proofpoints cloud-based DLP and email protection solutions for our customers.
  • ISA Cybersecurity has shown strong commitment and expertise with Proofpoint products, and is the first Proofpoint partner in Canada to offer this type of service.

Rochester Institute of Technology Eaton Cybersecurity SAFE Lab Testing Shows CloudCover’s® CC/B1 CyberSafety PlatformTM Provides “Significant Security Protection” Against Cyberattacks

Retrieved on: 
Tuesday, August 3, 2021

CloudCover, an automated intelligence (AI)-driven cybersecurity platform, today announces the results of the recent testing of its CC/B1 CyberSafetyPlatformTM, conducted by the Rochester Institute of Technologys (RIT) Eaton Cybersecurity SAFE (Security Assessment and Forensic Examination) Lab.

Key Points: 
  • CloudCover, an automated intelligence (AI)-driven cybersecurity platform, today announces the results of the recent testing of its CC/B1 CyberSafetyPlatformTM, conducted by the Rochester Institute of Technologys (RIT) Eaton Cybersecurity SAFE (Security Assessment and Forensic Examination) Lab.
  • The labs assessment shows that the CC/B1 platform provides significant defensive capabilities and successfully defended vulnerable systems against many common cyber threats and attack scenarios.
  • CloudCover engaged RITs SAFE Lab with the primary objective of evaluating the effectiveness of the CC/B1 Platform in stopping cyber criminals from successfully completing cyberattacks.
  • RITs Global Cybersecurity Institute and its Eaton Cybersecurity SAFE Lab are world-class facilities devoted to the education, training, and testing for the next generation of cybersecurity professionals and technologies.

Cado Security Unveils Cloud Memory Forensics For Enhanced Visibility and Context Across Data Breaches

Retrieved on: 
Tuesday, August 3, 2021

Many of today’s sophisticated hackers leverage techniques that run in memory only -- such as fileless malware, rootkits and process hollowing -- which leave no traces when data logs and host information are analyzed. If security teams aren’t able to capture evidence in memory, these attacks are extremely challenging to investigate. The Cado Response platform empowers security teams to investigate such attacks by automating memory capture and processing as soon as malicious activity is detected. Further, the Cado Response platform allows forensics experts to analyze memory alongside other critical data sources including disk information and cloud logs in a single pane of glass so they can easily grasp the full extent of what happened.

Key Points: 
  • With Memory Forensics, security teams gain enhanced visibility and context to identify the root cause of incidents and respond to data breaches faster.
  • By incorporating memory acquisition and processing capabilities directly in our Cado Response platform, security experts gain additional context and visibility into an attackers activities, further empowering them to investigate and respond to breaches at cloud speed.
  • The Cado approach provides security teams with 100% of the data and information they need to respond to breaches faster.
  • By automating data capture and processing across cloud and container environments, Cado Response enables security teams to effectively investigate and respond to cyber incidents at cloud speed.

Legal Cyber Attack Prevention and Recovery Live Webcasts Offered by eMazzanti Technologies and HSBA

Retrieved on: 
Tuesday, August 3, 2021

HOBOKEN, N.J., August 3, 2021 /PRNewswire-PRWeb/ -- eMazzanti Technologies, a specialist in legal cybersecurity , is featured in two upcoming Hawaii State Bar Association (HSBA) webcasts.

Key Points: 
  • HOBOKEN, N.J., August 3, 2021 /PRNewswire-PRWeb/ -- eMazzanti Technologies, a specialist in legal cybersecurity , is featured in two upcoming Hawaii State Bar Association (HSBA) webcasts.
  • The live online sessions will present simple steps to protect client information and to restore business and client trust after an attack.
  • Both sessions will feature Carl Mazzanti, President and Co-founder of eMazzanti Technologies, along with a guest law firm.
  • The first Live Webcast entitled, "Cyber Attack Prevention: Simple Steps to Safeguard Client Information," is scheduled Wednesday, August 4, 2021, 12:00 p.m. to 1:00 p.m. HAST.