Lookout unveils Endpoint Detection and Response solution for mobile
Endpoint Detection and Reponse solution is part of Lookout Security Platform.
Lookout announced the industry's first comprehensive mobile endpoint detection and response (EDR) solution. The offering is part of the Lookout Security Platform.
Lookout mobile EDR incorporates the console that th...
DDoS attacks are becoming more complex and frequent
A new report from the cybersecurity firm Netscout states that DDoS attacks have become more common and complex. The report, which looks into the effects of remote working on overall cybersecurity in the UK, said that cybercriminals have continued to innovate in their efforts.
The criminals are n...
Nearly all SOCs use AI and ML
The vast majority of security operations centres already apply artificial intelligence and machine learning to detect cyber attacks better.
This is according to a report by British IT company Micro Focus. Only 7 percent of the respondents stated that they do not yet use these techniques. Most of...
Fancy Bear imposters launch wave of extortion demands
Targets must pay thousands in Bitcoin or face DDoS attacks.
Last week, the digital security firm Radware published a blog post that included extortion notes from hackers. These notes had been sent to a variety of companies around the world, according to Radware.
In each of these "ransom notes...
Microsoft Azure Defender for IoT enters public preview
Product offers "agentless security" for unmanaged IoT/OT devices
Microsoft debuted a security solution last week for companies that manage "unmanaged" networks. These include networks with IoT (Internet of Things) or OT (Operational Technology, aka industrial equipment) devices.
Phil Neray, D...
Hackers are actively attacking Windows Active Directory servers
Attackers use the "Zerologon" exploit to backdoor unpatched Windows servers.
Last month we reported on a Windows vulnerability that allowed anyone to become an Admin on an organization’s Active Directory domain controllers.
Earlier this year, researchers at Secura published an exploit that...
The pandemic led to a surge in DDoS and Password Login attacks
In May and June, businesses may have caught a break, but cyberattacks are still becoming increasingly common. It is a well-documented fact that cyber-attacks against businesses and consumers have dramatically increased due to the pandemic.
F5 labs recently revealed more about the methods and t...
Palo Alto Networks adds new cloud security modules to Prisma Cloud
This week, Palo Alto Networks said that it is adding four new cloud security modules to Prisma Cloud, its multi-cloud security offering, which helps developers block vulnerabilities during app development and deployment.
Prisma Cloud is a new player in the market, combining several technologies ...
Microsoft helms campaign to disrupt TrickBot, the infamous botnet
Microsoft claimed that it disrupted the infamous botnet named TrickBot, in partnership with other companies. The evidence shows that only part of the botnet was affected by the takedown. TrickBot first appeared back in 2016 and is believed to be in more than 1 million machines.
It was used to ge...
Mobile ransomware has worryingly evolved, according to new research
Ransomware is not new, but every day, it brings new threats to governments, public service institutions, and any institution that suffers when there is downtime. Along with PC and server malware, Android phones are also one of the targets under fire.
In new research, Microsoft has shown that hac...
Trend Micro announces security solution for smart factories
The new solution is a transparent intrusion prevention system (IPS) for continuous production line operation.
Trend Micro announced a first of its kind intent-based industrial intelligent IPS array for industrial environments. The system is designed to protect large-scale industrial networks fro...
Embracing Shadow IT could accelerate enterprise growth
Accepting Shadow IT can actually help companies expand in the time of COVID.
Global cybersecurity leader Forcepoint and ICT giant Fujitsu have joined forces to help businesses meet the challenges of Shadow IT in the modern enterprise.
"Shadow IT" refers to the use of unapproved tools and pl...