Ransomware-wielding criminals constantly refine their behavior and tactics to maximize the chance of a payday, and recently they have been implementing fresh strategies for monetizing stolen data, says Steve Rivers at threat intelligence firm Kela.
IronNet is laying off 17% of its employees in a cost-cutting effort just 10 months after going public by merging with a special purpose acquisition company. The 55 layoffs will occur by the end of June and the company will spend the $1 million allocated for severance and other termination benefits.
Whether you’re looking at the barrage of increasingly
sophisticated ransomware variants or deeply embedded
corruptions in the software and vendor supply chains,
it’s impossible to ignore the fact that if security is a
game, the game has been changed beyond recognition.
It’s high time to modernize your...
The Uptycs Threat Research team publishes this quarterly bulletin as a 3-month lookback, summarizing the trends and findings of their original threat intel across the three major operating systems: Linux, Windows and macOS.
The Threat Research Team regularly monitors the TTPs (tactics, techniques and...
It's critical to enable companies to not only see what is going on in their IT environments, but to also quickly react, and "sheer manpower" is no longer sufficient to respond to the surge of cyberthreats evolving today, says Mike DeCesare, CEO of Exabeam.
While adversaries are often still using many of the same old methods and exploits to compromise their victims, the exposure and consequences of these attacks are becoming increasingly damaging, says Bryan Ware, CEO of LookingGlass Cyber Solutions. He discusses how to keep ahead of the adversaries.
Erwän Keräudy and Jeff Gore of CybelAngel say that due to cloud migration, people working remotely, and the connected ecosystem of suppliers, "the perimeter is dead." We need a comprehensive assessment of critical external threats, they say, including a scan of "the infrastructure of the internet."
Forescout has agreed to purchase startup Cysiv to help OT and IoT customers analyze, detect and respond to threats using cloud-native data analytics. The proposed acquisition will make it easier for customers to mine and cross-reference data that's stored on Forescout's platform.
Boston Children's Hospital thwarted a cyberattack by government-backed Iranian hackers last summer after U.S. authorities received intelligence about the pending assault and alerted the hospital, says FBI Director Christopher Wray, who called Iran's planned cyberattack "despicable."
Since at least the middle of last year, online attackers have been increasingly targeting the financial services sector.
So warns John Fokker, principal engineer and head of cyber investigations for the Advanced Threat Research group at cybersecurity firm Trellix. He says Trellix's latest threat assessment found a...
XDR is quickly becoming a preferred solution for security teams seeking a coordinated, holistic approach to their security operations.
By empowering teams with limitless ingestion, analysis, and protection across the entire organization, Elastic's Limitless XDR offering unifies data types to improve detection,...
Elastic has been named a Strong Performer in the 2022 Forrester Endpoint Detection and Response Providers Wave.
Elastic Security provides a different approach from other endpoint detection and response (EDR) vendors by combining EDR and SIEM capabilities, substantially reducing customers’ mean time to detect and...
Unfortunately, in this day and age, protecting assets is more difficult than ever from the corporate point of view. Organizations have spent many years and countless sums of money protecting the perimeter —
so-called “north-south” traffic. Yet agile, adaptive adversaries have found ways to breach perimeter...