Category Archives: Industry News

TetherView Digital Bunker: A one-way-in and one-way-out private cloud solution for enterprises

TetherView announced the launch of Digital Bunker, a comprehensive one-way-in and one-way-out private cloud solution for enterprise customers. The Digital Bunker enables businesses to provide their employees with a trusted, secure virtual environment, custom-tailored to their specific industry and compliance requirements. Through Digital Bunker, businesses can see, touch, audit, and prevent all access to their sensitive data, while providing their employees with a scalable high-performance workspace. Pricing is a flat fee per user and is … More

The post TetherView Digital Bunker: A one-way-in and one-way-out private cloud solution for enterprises appeared first on Help Net Security.

ONF SD-RAN 1.0: A cloud-native platform for software-defined RAN consistent with O-RAN

The ONF announced a major milestone for the SD-RAN open RAN project with its first software release. SD-RAN v1.0 is a cloud-native exemplar platform for software-defined RAN that is consistent with the O-RAN architecture. Background Carriers globally are looking to open RAN as a way to enable modular and customizable 5G solutions that avoid vendor lock-in and enable the mix-and-match of vendors’ components while accelerating the ability to innovate and add new functionality, and a … More

The post ONF SD-RAN 1.0: A cloud-native platform for software-defined RAN consistent with O-RAN appeared first on Help Net Security.

Syniverse RCS P2P hub advances messaging capabilities for mobile messaging users

Syniverse announced the growth of its rich communications services (RCS) person-to-person (P2P) hub to expedite the company’s messaging platform’s globally. In addition to having privacy and security compliance, the Syniverse RCS P2P hub provides mobile network operators with a single connection to more than 85 mobile networks and over-the-top (OTT) providers. For nearly a year, Syniverse has been driving P2P interconnect and interworking by handling an average of more than 400 million messages a day … More

The post Syniverse RCS P2P hub advances messaging capabilities for mobile messaging users appeared first on Help Net Security.

Quantum unveils H2000 Series, a line of hybrid storage arrays

Quantum announced the launch of the H2000 Series of hybrid storage arrays to provide customers with cost-effective performance, ease of use, and scalability for data-intensive workflows. Marking a significant increase in performance on previous generation systems, the H2000 Series is designed to leverage both SSD and HDD media to align performance, capacity, and cost with the demands of business applications. Its tight integration with Quantum’s StorNext® File System enables end users to achieve higher levels … More

The post Quantum unveils H2000 Series, a line of hybrid storage arrays appeared first on Help Net Security.

D-Link COVR-X1870 Series Whole Home Mesh Wi-Fi 6 Systems provide faster speeds and greater capacity

D-Link announced their new COVR-X1870 Series Whole Home Mesh Wi-Fi 6 Systems, including multi-pack options that are all equipped with Wi-Fi 6 and mesh technology to provide faster speeds, greater capacity, and less network congestion for the modern device-dense smart home. With next generation speeds of up to 1.8 Gbps total, these Covr AX Wi-Fi 6 solutions are perfect for simultaneous 4K streaming, VR gaming, video calling, and keeping the smart home connected. They also … More

The post D-Link COVR-X1870 Series Whole Home Mesh Wi-Fi 6 Systems provide faster speeds and greater capacity appeared first on Help Net Security.

Aradatum launches self-powered macro cell tower to support 5G, edge and telecom

Aradatum introduced the world’s first truly self-powered macro cell tower that can be placed literally anywhere. Aradatum is a technology company that dares to go where others don’t. Taking a unique approach to modernizing telecom infrastructure, the start-up’s self-powered towers give wireless pioneers and mobile and virtual network operators (MNOs/MVNOs) access to previously unreached and strategic locations needed to optimize their advanced applications of 5G, fixed wireless access (FWA), Citizens Broadband Radio Service (CBRS), neutral … More

The post Aradatum launches self-powered macro cell tower to support 5G, edge and telecom appeared first on Help Net Security.

CloudLinux expands its Extended Lifecycle Support services for Linux distributions

CloudLinux announces the expansion of its affordable Extended Lifecycle Support (ELS) services for Linux distributions, by providing its own updates and security patches for several years after expiration of the products’ end-of-life date. For example, support for CentOS 6 from Red Hat expired November 30 last year. CloudLinux offers ELS for CentOS 6, available since November, 2020 and extends to June 2024. Oracle Linux 6 (ends March 2021) Extended Lifecycle Support service will be available … More

The post CloudLinux expands its Extended Lifecycle Support services for Linux distributions appeared first on Help Net Security.

Deloitte bolsters cyber threat hunting capabilities with acquisition of Root9B

Deloitte announced its acquisition of substantially all the assets of Root9B. The deal will bolster Deloitte’s existing Detect and Respond cyber client offering with R9B’s deeply experienced cyber operations professionals and its award-winning threat-hunting and risk assessment solutions. “Commercial and government entities contend with cyber adversaries who use incredibly sophisticated technology to penetrate legacy defenses and take advantage of expanding attack surfaces,” said Deborah Golden, Deloitte Risk & Financial Advisory Cyber and Strategic Risk leader … More

The post Deloitte bolsters cyber threat hunting capabilities with acquisition of Root9B appeared first on Help Net Security.

Ivanti acquires Cherwell to expand the reach of its Neurons platform

IvantiCherwell Software announced it has signed a definitive agreement to acquire Cherwell Software. The terms of the Cherwell transaction were not disclosed. Ivanti is acquiring Cherwell to expand the reach of its Neurons platform, providing end-to-end service and asset management from IT to lines of business and from every endpoint to the IoT edge. Ivanti will continue to maintain and invest in both Cherwell and Ivanti service management platforms while working to converge the best … More

The post Ivanti acquires Cherwell to expand the reach of its Neurons platform appeared first on Help Net Security.

Platform9 unburdens users from the complexities of Kubernetes while ensuring fast adoption

Platform9 announced a number of new features to provide operational efficiencies for its freedom, growth, and enterprise managed Kubernetes products. Key advances include multi-version Kubernetes support, enhanced cluster deployment options, and upgraded manageability. Use cases span Technology, Retail, Telco, Media, and Entertainment verticals. “Focused on offering ease-of-use features and increasing efficiencies, this product release continues to address deployment challenges faced by IT, DevOps, and SRE and IT teams while increasing our solution’s flexibility, performance, and … More

The post Platform9 unburdens users from the complexities of Kubernetes while ensuring fast adoption appeared first on Help Net Security.

Ivanti Velocity and Ivanti Speakeasy now optimized for SAP environments

Ivanti Wavelink announced that Ivanti Velocity 2.1 and Ivanti Speakeasy 1.0 have achieved SAP certification as integrated with SAP S/4HANA and SAP NetWeaver. These integrations help to optimize the mobile user experience for customers within their SAP environments. Adding SAP Extended Warehouse Management (SAP EWM) and the browser apps for the mobile internet transaction server (ITS) component within SAP S/4HANA to its portfolio of supported solutions, Ivanti Wavelink brings a modern, mobile interface to SAP … More

The post Ivanti Velocity and Ivanti Speakeasy now optimized for SAP environments appeared first on Help Net Security.

CloudNatix raises $4.5M to meet the demand for their product across multiple geographies and markets

CloudNatix announced the close of a $4.5M seed round financing. The new round was led by DNX Ventures, with the participation from a new investor Cota Capital and existing investors: Incubate Fund, Vela Partners and 468 Capital. The new funds will be used to help the company scale the engineering and sales organizations to meet the great demand for their product across multiple geographies and vertical market segments. “CloudNatix’s seamless multi-cloud auto-pilot infrastructure platform lets … More

The post CloudNatix raises $4.5M to meet the demand for their product across multiple geographies and markets appeared first on Help Net Security.

Internet Society Foundation awards $1M to projects that examine the future and sustainability of the internet

The Internet Society Foundation has awarded over $1 million through its Research grant programme to seven projects that examine the future and sustainability of the internet. In its pilot year, this programme seeks to support a diverse group of researchers who are generating solutions today to meet the internet challenges of tomorrow. The selected projects explore important issues around the internet’s relationship to society, such as: the economic cost of the digital gender gap, the … More

The post Internet Society Foundation awards $1M to projects that examine the future and sustainability of the internet appeared first on Help Net Security.

Ashok Krishnan joins AXA XL as Chief Data and Analytics Officer

AXA XL has appointed Ashok Krishnan as Chief Data and Analytics Officer. Mr. Krishnan will report to Matthieu Caillat, Chief Operating Officer, AXA XL and will be based in London. Commenting, Mr. Caillat said: “I am pleased to welcome Ashok to AXA XL. His extensive expertise and background in analytics and data science, combined with his knowledge of the P&C insurance market, will further strengthen AXA XL’s innovation and technology-led approach as we accelerate our … More

The post Ashok Krishnan joins AXA XL as Chief Data and Analytics Officer appeared first on Help Net Security.

InfluxData appoints Vidya Peters to its Board of Directors

InfluxData announced the appointment of Vidya Peters to its Board of Directors, and introduced a new Advisory Board team to support strategic and accelerated growth. Peters is the first member of the InfluxData Board of Directors with a marketing background. Peters is an exceptional executive with a history of spearheading successful marketing and go-to-market strategies at both fast-growing startups and public companies. She is currently the chief marketing officer at FinTech company Marqeta, Inc., and … More

The post InfluxData appoints Vidya Peters to its Board of Directors appeared first on Help Net Security.

Cloud Controls Matrix v4 adds 60+ new cloud security controls

The Cloud Security Alliance (CSA) announced the availability of version 4 of the Cloud Controls Matrix (CCM), CSA’s cybersecurity framework for cloud computing. The CCM v4 includes additional cloud security and privacy-related controls and encompasses coverage of requirements deriving from new cloud technologies, improved control auditability, enhanced interoperability and compatibility with other standards, and expanded support offerings to navigate the cloud shared responsibility model. CCM is a cybersecurity control framework for cloud computing that aligns … More

The post Cloud Controls Matrix v4 adds 60+ new cloud security controls appeared first on Help Net Security.

Verimatrix launches enhanced Application Protection service for Android

Verimatrix announced general availability of version 2.2 of the Verimatrix Application Protection service for Android. The company’s latest Code Protection service for Android applications now supports the forthcoming Android ecosystem change that will mandate the use of Android Application Bundles (AABs) in the second half of 2021. A significant shift for developers, the upcoming AAB mandate creates a need for simple, reliable software security that prevents app attacks. In addition to traditional APKs, the Verimatrix … More

The post Verimatrix launches enhanced Application Protection service for Android appeared first on Help Net Security.

Field Nation Premier: Helping MSPs maximize profitability and service delivery strategy

Field Nation is introducing an enhanced version of Field Nation Premier that provides MSPs with three new features: MarketSmart Insights, PeopleSmart Talent Management Suite and WorkSmart Productivity Suite. “For MSPs, maximizing profitability has never been more challenging or more critical,” said Wael Mohammed, EVP of Product Management, Field Nation. “We designed Field Nation Premier to help companies address their top-line and bottom-line priorities, while getting more business value out of incorporating on-demand labor into their … More

The post Field Nation Premier: Helping MSPs maximize profitability and service delivery strategy appeared first on Help Net Security.

KABN partners with The Campus Agency to reach the US college and university market

KABN announces that it has entered into an agreement to partner with The Campus Agency to create innovative engagement programs for Liquid Avatar to reach the US college and university student, alumni and family market. KABN NA and The Campus Agency will be working together to engage micro-influencers, develop and launch innovative engagement and Augmented Reality programs to introduce the college and university market to the Liquid Avatar and KABN value programs. The partnership goals … More

The post KABN partners with The Campus Agency to reach the US college and university market appeared first on Help Net Security.

BitDam adds MSP console to its Advanced Threat Protection solution

BitDam announced that it is enhancing its offering for MSPs (Managed Service Providers) by adding a unique MSP console to its Advanced Threat Protection solution. This console provides MSPs with an overview of all tenants/clients/organizations they oversee and enables fast and easy management. BitDam ATP secures business collaboration platforms (email, cloud drives, instant messaging and more) from unknown content-borne threats at first encounter. BitDam protects from malware, ransomware, phishing, BEC and zero-day attacks at unmatched … More

The post BitDam adds MSP console to its Advanced Threat Protection solution appeared first on Help Net Security.

PacketFabric Cloud Router: A multi-cloud connectivity solution

PacketFabric announced it has launched Cloud Router, a multi-cloud connectivity solution. PacketFabric’s Cloud Router is built on the edge with market-leading distributed architecture and is one of the most technically advanced multi-cloud products on the market today. Cloud Router will super-serve the enterprise as well as small business who are seeking a future-proofed way to connect multiple cloud providers. “With the launch of Cloud Router, PacketFabric now can provide connectivity to colocation, hybrid cloud and … More

The post PacketFabric Cloud Router: A multi-cloud connectivity solution appeared first on Help Net Security.

Absolute’s customers can now self-heal critical apps to secure their distributed workforces

Absolute Software announced customers can now autonomously self-heal more of the critical applications they rely on to secure remote access and communication for their distributed workforces. Using Absolute’s Application Persistence service, IT and security administrators can help ensure the Netskope Cloud Access Security Broker (CASB) and Next-Gen Secure Web Gateway (NG-SWG) – in addition to more than 40 other leading endpoint security agents and productivity tools – remain installed, healthy, and undeletable. The ongoing global … More

The post Absolute’s customers can now self-heal critical apps to secure their distributed workforces appeared first on Help Net Security.

SS8 improves mediation results for law enforcement with Xcipio

SS8 Networks announced that it deployed its Xcipio mediation and interception platform in one of the largest global CSPs to support their Multi-access Edge Computing (MEC) infrastructure. Next generation network architectures benefit from distributed traffic processing, which requires some communications traffic to be processed on the edge and not in the network core. This is true for CSPs that leverage an MEC, which is often used for high traffic applications including Internet of Things (IoT) … More

The post SS8 improves mediation results for law enforcement with Xcipio appeared first on Help Net Security.

Rocket Terminal Emulator: Cost-effective host access without compromising functionality

Rocket Software announced the availability of Rocket Terminal Emulator, the culmination of decades of investment in this critical and often-overlooked technology space. This software upgrade is available at no cost to all Rocket terminal emulation customers, including BlueZone and Passport, as part of the company’s commitment to delivering the most feature-rich, configurable and modern host access for mission-critical systems. IBM Z, IBM i, and other virtual terminal, VT-based systems continue to be the cornerstones of … More

The post Rocket Terminal Emulator: Cost-effective host access without compromising functionality appeared first on Help Net Security.

Diligent launches Cyber Risk Scorecard powered by SecurityScorecard

Diligent announced the launch of its new Cyber Risk Scorecard powered by SecurityScorecard, the global leader in cybersecurity ratings. Diligent’s Cyber Risk Scorecard equips board directors and executives with a digital tool set that enables greater transparency and the ability to measure risk, build resilience, and increase organizational safety and security. The new Cyber Risk Scorecard provides organizations with a data-backed cyber risk score based on a list of predetermined factors developed by SecurityScorecard, named … More

The post Diligent launches Cyber Risk Scorecard powered by SecurityScorecard appeared first on Help Net Security.

QSC unveils Professional Tier feature set for Q-SYS Reflect Enterprise Manager

QSC announced the availability of the new Professional Tier feature set for Q-SYS Reflect Enterprise Manager remote monitoring and management service. This advanced feature set enables both remote access to UCIs for helpdesk applications, as well as remote system and design file update capabilities. In addition, QSC has begun shipping two recently introduced Q-SYS Core processors – the Q-SYS Core Nano, which is a purely network I/O processor, and the Q-SYS Core 8 Flex, which … More

The post QSC unveils Professional Tier feature set for Q-SYS Reflect Enterprise Manager appeared first on Help Net Security.

Zyxel 10G PON ONT solutions enable service providers to deliver 10G broadband services

Zyxel Communications announced the launch of its portfolio of high-performance 10G PON ONT solutions, which includes the PX7511 AX6000 WiFi 6 XGS-PON VoIP Gateway ONT, PM7516 XGS-PON VoIP Bridge ONT with 10G LAN, and PM7010 XGS-PON SFP+ ONT. Zyxel 10G PON ONT solutions enable service providers to break free of the bandwidth limitations of GPON and rapidly monetize their networks through high-ARPU premium-tier residential services and commercial applications. In addition to significantly increasing the connections … More

The post Zyxel 10G PON ONT solutions enable service providers to deliver 10G broadband services appeared first on Help Net Security.

Stealthbits Data Privacy Engine: Speeding data analysis, compliance and governance reporting

Stealthbits unveiled its new Data Privacy Engine that connects user identities with the locations of their personal data to elevate data access governance. This enables organizations worldwide to deal with Data Subject Access Requests (DSARs) efficiently and effectively, mitigating the risk of substantive fines under worldwide privacy laws. “Privacy legislation, including the General Data Protection Regulation (GDPR), demands fast and efficient response to DSARs,” said Adam Rosen, vice president, product strategy, Stealthbits. “Our new Data … More

The post Stealthbits Data Privacy Engine: Speeding data analysis, compliance and governance reporting appeared first on Help Net Security.

GTT enhances its managed security services to deliver advanced software-defined capabilities

GTT Communications announced it has enhanced its portfolio of managed security services. Leveraging Fortinet’s next-generation Security Fabric, GTT is now able to deliver more advanced software-defined capabilities, including unified threat prevention (UTP), which integrates a range of security features, such as application control, web filtering, antivirus, data loss prevention, and intrusion detection and prevention. Additionally, GTT has added Managed Detection and Response capabilities to its security service portfolio, which provides comprehensive security coverage for cloud, … More

The post GTT enhances its managed security services to deliver advanced software-defined capabilities appeared first on Help Net Security.

Thales and Sequans extend collaboration for next generation cellular IoT modules

Sequans Communications announced that Thales intends to use Sequans’ second generation Monarch 2 and Calliope 2 platforms as a basis for its new generation of Cinterion IoT LTE-M/NB-IoT and Cat 1 modules. Thales has been using Sequans’ first generation massive IoT modem technology in its Cinterion IoT modules since 2015 and has shipped them worldwide. The availability of Sequans’ second generation massive IoT chips will now fuel a second phase of collaboration aimed at providing … More

The post Thales and Sequans extend collaboration for next generation cellular IoT modules appeared first on Help Net Security.

StackPulse raises $20M to invest in global growth and scale engineering hiring

StackPulse announced a $20 million Series A led by GGV Capital. This newest funding brings the total amount raised to $28 million, including a previously undisclosed $8 million seed round less than a year ago led by Bessemer Venture Partners, which also participated in the Series A. Glenn Solomon at GGV and Amit Karp at Bessemer will join the StackPulse board of directors; Oren Yunger at GGV will join as a board observer. The funds … More

The post StackPulse raises $20M to invest in global growth and scale engineering hiring appeared first on Help Net Security.

Cyral gains CISO recognition, adds key hires to its executive team

Cyral has been recognized by CISOs nationwide as a leader in innovative security, worthy of both recognition and investment. In October 2020, Cyral received a strategic investment from Silicon Valley CISO Investments (SVCI), an angel syndicate of more than 50 practicing CISOs investing in a small number of innovative cybersecurity startups. Soon after, Cyral was awarded two CISO Choice Awards, one for Startup Security Company and the other for Data Security. The CISO Choice Awards … More

The post Cyral gains CISO recognition, adds key hires to its executive team appeared first on Help Net Security.

DataLocker releases encrypted USB drive with capacities up to 15.3 TB

DataLocker announced the release of an entirely new breed of encrypted USB drive. The DL4 FE changes the game for security professionals by providing bulletproof security and simple remote management in a small-form-factor USB drive with capacities up to 15.3 TB. “The onslaught of attacks by state actors, hackers, and cyber cartels continues. Threat actors are trying to exfiltrate terabytes of data to hold for ransom. Some want access to essential IT systems for later … More

The post DataLocker releases encrypted USB drive with capacities up to 15.3 TB appeared first on Help Net Security.

Cyber Observer enhances its platform with unified visibility of security tool effectiveness

Cyber Observer announced a major enhancement to its platform that enables CISOs and other security and risk management executives to obtain new, continuous, unified visibility into the effectiveness of cybersecurity tools that are implemented throughout their enterprise. By continuously retrieving and analyzing Critical Security Controls (CSCs) from applications on-premises and in-cloud, Cyber Observer’s CCM platform simplifies compliance, reduces mean time to detection and response, and advances risk posture management. Cybersecurity teams are overwhelmed with complexity … More

The post Cyber Observer enhances its platform with unified visibility of security tool effectiveness appeared first on Help Net Security.

Rancher’s platform for managed Kubernetes now available through BoxBoat’s MAS contract with the GSA

BoxBoat announced that Rancher Federal’s enterprise platform for managed Kubernetes is now available through BoxBoat’s Multiple Award Schedule contract with the General Services Administration (GSA). This expansion of BoxBoat’s relationship with Rancher Federal will enable government agencies to take greater advantage of Rancher’s support for certified Kubernetes distribution, either on-premise or in the public cloud. As agencies adopt Kubernetes and DevSecOps, Rancher provides audited and US-validated distributions of critical open-source products necessary to deliver cutting-edge … More

The post Rancher’s platform for managed Kubernetes now available through BoxBoat’s MAS contract with the GSA appeared first on Help Net Security.

Netskope NewEdge network now expanded to a new data center in Singapore

Netskope announced the expansion of the Netskope NewEdge network to a new data center in Singapore. Serving millions of enterprise users around the world, Netskope NewEdge is a carrier-grade private cloud network that is reserved exclusively for Netskope customers. The expansion of the Singapore data center enhances the NewEdge infrastructure, building on Netskope’s investment in the region to better serve local and multinational customers. Trustwave, a Singtel company and the global security arm of Singtel, … More

The post Netskope NewEdge network now expanded to a new data center in Singapore appeared first on Help Net Security.

McAfee partners with ECS to offer MDR capabilities through MVISION EDR

McAfee announced that it is partnering with ECS to offer managed threat detection and response (MDR) capabilities through McAfee MVISION EDR. ECS is the first North American MDR partner for McAfee MVISION EDR and will leverage MVISION EDR and supporting vendors to deliver a scalable, repeatable and customizable program that enables organizations to focus on only verified threats. MDR solutions can help organizations by alleviating the customer challenges associated with alert fatigue, false positives, inexperienced … More

The post McAfee partners with ECS to offer MDR capabilities through MVISION EDR appeared first on Help Net Security.

uCloudlink signs agreement with CVITC to develop smart container solutions powered by Cloud SIM

uCloudlink has inked a Strategic Cooperation Framework Agreement with China Vehicle Interconnected Transport Capacity Technology (“CVITC”). The partnership will see both companies develop innovative smart container solutions for domestic and international freight markets powered by uCloudlink’s core patented Cloud SIM technology which accelerates the development of the global container transportation industry. The advent of container shipping has dramatically improved cargo transportation efficiency around the world. Despite this, this shipping method is often hazardous, and there … More

The post uCloudlink signs agreement with CVITC to develop smart container solutions powered by Cloud SIM appeared first on Help Net Security.

Tanium collaborates with OpenCTI to help orgs increase their threat detection capabilities

Tanium has announced a collaboration with OpenCTI, an open source platform which specialises in the analysis of cyber threats. The collaboration will allow the integration of Tanium’s behavior-based detection offering, Tanium Signals, with OpenCTI, helping organizations to store, organize and visualise intelligence information in real-time. The Tanium-OpenCTI connector is now ready for production use and available to all Tanium customers. The ability to collect and analyse Cyber Threat Intelligence (CTI) is critical, as cyber teams … More

The post Tanium collaborates with OpenCTI to help orgs increase their threat detection capabilities appeared first on Help Net Security.

Swimlane raises $40M to accelerate partnerships and alliances, expand research and development

Swimlane announced it has raised $40 million in funding led by EIP. This funding will accelerate partnerships and alliances, expand research and development, and enable further global expansion. Additionally, Swimlane has appointed James Brear as Chief Executive Officer, who was previously CEO of Veriflow, which was sold to VMWare in August 2019. Industry visionary and Senior Operating Partner at EIP, Niloofar Howe, has also been named as the company’s newest board member. “Without a doubt, … More

The post Swimlane raises $40M to accelerate partnerships and alliances, expand research and development appeared first on Help Net Security.

Impartner appoints Robert Reid to its board of directors

Impartner announced it has appointed Robert Reid to the company’s board of directors. Reid is chairman of Mid-Market Solutions for Sage, the market leader in cloud business management solutions. Prior to Sage, Reid was CEO of Intaact (which was acquired by Sage), LucidEra, UpShot and Seeker Software. A respected thought leader in the software-as-a-service (SaaS) industry, Reid has won multiple CEO leadership awards, including Best CEO in the Financials Industry, CEO of the year for … More

The post Impartner appoints Robert Reid to its board of directors appeared first on Help Net Security.

Deploying AI-powered cybersecurity directly on drones

SparkCognition and SkyGrid announced a new collaboration to deploy AI-powered cybersecurity directly on drones, protecting them from zero-day attacks during flight. Equipped with SparkCognition’s DeepArmor cybersecurity product, SkyGrid is the first airspace management system to enable drone protection powered by AI. This approach provides more advanced airspace security than traditional anti-malware reliant on signatures of known threats. “In the near future, we’ll essentially have a network of flying computers in the sky, and just like … More

The post Deploying AI-powered cybersecurity directly on drones appeared first on Help Net Security.

My Office Apps Kechie 2021 ERP: Enabling quick access to business-critical information in real time

My Office Apps announced the availability of Kechie 2021 Enterprise Resource Planning (ERP) software, a cloud-based solution, enabling quick access to business-critical information in real time. The company has raised the Software as a Service (SaaS) bar by delivering innovative features to make small-to-medium sized manufacturing, distribution, and non-profit operations more productive and competitive, while increasing efficiency and effectiveness. With over thirty years of business solutions, Kechie is a proven leader in business transformation software … More

The post My Office Apps Kechie 2021 ERP: Enabling quick access to business-critical information in real time appeared first on Help Net Security.

Neurotechnology SentiVeillance 8.0 SDK: Creating identification by using live video streams

Neurotechnology announced the release of the SentiVeillance 8.0 software development kit (SDK). With SentiVeillance SDK, developers can create identification solutions that use live video streams from digital surveillance cameras or video files. The latest version adds face detection and recognition of people who are wearing masks and includes new algorithms that improve license plate detection and recognition speed and accuracy. It also provides new features for vehicle and human (VH) mode, including car make and … More

The post Neurotechnology SentiVeillance 8.0 SDK: Creating identification by using live video streams appeared first on Help Net Security.

DigiPlex signs agreement with HPE to host AI and HPC technology in its Stockholm data center

DigiPlex has signed an agreement with Hewlett Packard Enterprise (HPE) to host AI and High-Performance Computing (HPC) technology in its Stockholm data center. The DigiPlex Stockholm campus is located close to Arlanda, the capital airport of Sweden, the perfect geographical location for business needs. The multi award-winning campus runs on electricity from 100% renewable energy and offers 26,000 m² with up to 40 MW capacity which makes it attractive to businesses from a sustainability perspective. … More

The post DigiPlex signs agreement with HPE to host AI and HPC technology in its Stockholm data center appeared first on Help Net Security.

Reply and AWS develop industry solutions for different businesses

Reply announces it has signed a strategic collaboration agreement (SCA) with Amazon Web Services (AWS) to develop industry solutions for financial services, manufacturing, automotive, retail, energy, and telco customers. Through this SCA, the Reply Group of companies dedicated to AWS – Comsysto Reply, Data Reply, Sense Reply, and Storm Reply – will work with organizations of virtually all sizes and allow them to innovate faster and deliver consistent improvements on their business processes using advanced … More

The post Reply and AWS develop industry solutions for different businesses appeared first on Help Net Security.

IAR Build Tools for Linux now supported by Parasoft C/C++test

Parasoft announced its C/C++test update to support IAR Systems‘ build tools for Linux for Arm. IAR Build Tools for Linux inspired the update of Parasoft’s unified testing solution for C/C++test software development. With these tools combined, software developers gain the ability to configure fast and scalable CI/CD pipelines on Linux servers and automate the testing process. IAR Build Tools for Linux uses the leading build tools from IAR Embedded Workbench and empowers software developers who … More

The post IAR Build Tools for Linux now supported by Parasoft C/C++test appeared first on Help Net Security.

RunSafe Security and ReleaseTEAM partner to deliver more security options to DevOps clients

RunSafe Security announced a partnership with ReleaseTEAM, a full-service DevOps consulting firm. With this relationship, ReleaseTEAM delivers even more security options to its DevOps clients. “Given ReleaseTEAMS’ mission to empower customers on their DevOps journey, security was a crucial consideration for the company,” said Joe Saunders, CEO of RunSafe Security. “Alkemist was a logical fit to their portfolio and allows for a secure move from traditional software development lifecycle practices to a modern DevOps environment.” … More

The post RunSafe Security and ReleaseTEAM partner to deliver more security options to DevOps clients appeared first on Help Net Security.

DocuSign closes offering of 0% convertible senior notes due 2024 for gross proceeds of $690M

DocuSign announced that it has closed its offering of 0% convertible senior notes due 2024 for gross proceeds of $690.0 million, including the full exercise of the $90.0 million option to purchase additional notes granted by DocuSign to the initial purchasers. The notes were sold only to qualified institutional buyers pursuant to Rule 144A under the Securities Act of 1933, as amended (the “Act”). The notes are general unsecured, senior obligations of DocuSign that do … More

The post DocuSign closes offering of 0% convertible senior notes due 2024 for gross proceeds of $690M appeared first on Help Net Security.

Zluri raises $2M to expand sales, marketing, and engineering functions

Zluri announced a seed investment of $2M from Endiya Partners and Kalaari Capital. The funding will help expand sales, marketing, and engineering functions and build integrations and no-code workflow automation for SaaS applications. Founded by Sethu Meenakshisundaram, Ritish Reddy, and Chaithanya Yambari, Zluri was born out of challenges experienced first-hand by the founding team. Today, 3rd party SaaS solutions used by corporates do not follow systems or processes to manage them, leading to hidden dollar … More

The post Zluri raises $2M to expand sales, marketing, and engineering functions appeared first on Help Net Security.

CI Security appoints Steve Sedlock as CRO and Kristoffer Turner as VP of Security Operations

CI Security announced the addition of Steve Sedlock as the company’s Chief Revenue Officer (CRO) and the promotion of Kristoffer Turner to Vice President of Security Operations for the Critical Insight Security Operations Centers. “CI Security is quickly becoming the go-to resource for cyber security services and solutions in the market. With the addition of Steve Sedlock and the promotion of Kristoffer Turner, we are investing to enhance a world-class executive team,” said Garrett Silver, … More

The post CI Security appoints Steve Sedlock as CRO and Kristoffer Turner as VP of Security Operations appeared first on Help Net Security.

SAP appoints Julia White and Scott Russell to the Executive Board

SAP announced that the Supervisory Board appointed Julia White and Scott Russell to the Executive Board. White will take a new Executive Board role as chief marketing and solutions officer. Russell will head SAP’s Customer Success organization. He will succeed Adaire Fox-Martin, who has informed the Supervisory Board that she will depart the company at the end of the month. “We are very pleased to have both Julia and Scott join the Executive Board to … More

The post SAP appoints Julia White and Scott Russell to the Executive Board appeared first on Help Net Security.

Options names Kieran Northime VP of Software Development

Options has announced former NYSE Euronext executive, Kieran Northime as VP of Software Development. Kieran joins Options with three decades of experience across infrastructure, market data and software development, following roles with Wombat Financial Software, Lehman Brothers, Misys (now Finastra), and at NYSE Euronext, where he was VP of Technology, Exchange Solutions. Prior to Options, Kieran most recently founded bespoke systems solution company, Black Eye Technology. He has experience working with a wide range of … More

The post Options names Kieran Northime VP of Software Development appeared first on Help Net Security.

Raymond Brancato joins Tufin as Chief Revenue Officer

Tufin announced that Raymond Brancato has been appointed Chief Revenue Officer, reporting directly to CEO and co-founder Ruvi Kitov. In his new role, Mr. Brancato will be responsible for building on the company’s momentum by leading Tufin’s sales efforts across all products globally. Tufin’s current SVP of Global Sales, Kevin Maloney, will assist with the transition through the end of March after a tenure of five and a half years, during which time revenues tripled … More

The post Raymond Brancato joins Tufin as Chief Revenue Officer appeared first on Help Net Security.

MetricStream appoints Aravind Varadharajan as Managing Director of Asia Pacific

MetricStream announced Aravind Varadharajan as Managing Director of Asia Pacific based in Singapore. As part of the company’s continued expansion in APAC where organizations are adopting digital services faster than ever before, they named Aravind to lead the entire region covering customer needs to provide comprehensive solutions for Integrated Risk Management. Aravind is a highly seasoned business leader with over 20 years of experience across sales and business management in Japan, ASEAN and global markets … More

The post MetricStream appoints Aravind Varadharajan as Managing Director of Asia Pacific appeared first on Help Net Security.

Port53 launches SOC-as-a-Service, offering 24/7 monitoring, detection, and response

Port53 Technologies announced the launch of their new SOC-as-a-Service, offering 24/7 monitoring, detection, and response. As organizations face advanced security challenges amidst an ongoing pandemic and accelerated adoption of cloud computing, it is becoming essential to deploy a good security operations center. However, building a next-generation SOC can be too complex, expensive, and inaccessible for small and mid-sized businesses and enterprises. Port53 harnesses the power of Cisco SecureX to provide a completely unique SOC-as-a-Service offering … More

The post Port53 launches SOC-as-a-Service, offering 24/7 monitoring, detection, and response appeared first on Help Net Security.

Baffle DPS on AWS simplifies tokenization and encryption of data stored in Amazon RDS

Baffle announced that its Data Protection Services (DPS) on AWS dramatically simplifies tokenization and encryption of data stored in Amazon Relational Database Service (Amazon RDS) environments without any application code modifications while supporting a Bring Your Own Key (BYOK) or Hold Your Own Key (HYOK) model. Enterprises continue to race to the cloud and other modern platforms, but legacy encryption approaches that were not designed for the cloud continue to stumble and expose data. Cloud … More

The post Baffle DPS on AWS simplifies tokenization and encryption of data stored in Amazon RDS appeared first on Help Net Security.

Prosperoware adds data protection features for Office 365, supports Azure for storage

Prosperoware announces data protection features for Office 365 including OneDrive, SharePoint Online, Teams, and support Azure for storage location as part of its CAM platform. CAM is an enterprise digital transformation and governance platform for collaboration systems, designed to improve adoption, enhance processes around management of office documents for projects or engagements, and reduce risks related to privacy & cybersecurity. Faced with increasing data loss concerns and regulatory oversight, organizations are looking for improved capabilities … More

The post Prosperoware adds data protection features for Office 365, supports Azure for storage appeared first on Help Net Security.

ExaGrid Tiered Backup Storage appliances: Increasing overall size of a full backup in single system

ExaGrid announced its new line of Tiered Backup Storage appliances, which increases the overall size of a full backup in single system. The new line continues ExaGrid’s unique scale-out approach to backup storage architecture, allowing customers to mix and match appliances of any size or age into a single scale-out system, so that customers can grow their systems as their data grows. The new appliances are available immediately. ExaGrid’s seven new appliance models are the … More

The post ExaGrid Tiered Backup Storage appliances: Increasing overall size of a full backup in single system appeared first on Help Net Security.

Dynatrace Application Security Module directly linked to Snyk Intel to ease developer remediation

Dynatrace announced that its Application Security Module now directly links the vulnerabilities it identifies in real time in production and pre-production environments to the Snyk Intel database of open source vulnerabilities to facilitate faster and easier remediation by developers. Dynatrace Application Security, the newest module in Dynatrace’s all-in-one Software Intelligence Platform, is optimized for Kubernetes architectures and DevSecOps approaches. With always-on runtime application security analysis and automatic AI data-flow-analysis, Dynatrace provides risk-weighted prioritization of vulnerabilities, … More

The post Dynatrace Application Security Module directly linked to Snyk Intel to ease developer remediation appeared first on Help Net Security.

D-Link announces official implementation of the IEC 62443-4-1 industry security standard certification

D-Link announced their official implementation of the IEC 62443-4-1 industry security standard, which was certified by internationally recognized certification organization TÜV NORD. From design and development to testing and implementation, D-Link develops all products with strict security processes integrated into the product life cycle. In order to further enhance product security, D-Link has adopted the IEC 62443-4-1 standard, Product Security Development Life-Cycle Requirements, which specifies process requirements for the secure development of products used in … More

The post D-Link announces official implementation of the IEC 62443-4-1 industry security standard certification appeared first on Help Net Security.

Greg Brown joins Udemy as president

Udemy announced that Greg Brown has joined the company as president. Brown brings over 20 years of executive experience leading high-growth and mission-driven technology companies and joins Udemy to help thousands of global customers achieve better business outcomes and drive innovation through learning. “We are excited to welcome Greg to Udemy during this important growth stage for the company,” said Gregg Coccari, CEO of Udemy. “As our business continues to accelerate around the world, Greg’s … More

The post Greg Brown joins Udemy as president appeared first on Help Net Security.

Very Good Security appoints Paul Machle as Chief Financial Officer

Very Good Security (VGS) announced the hire of Paul Machle as Chief Financial Officer (CFO). The finance veteran joins VGS on the heels of a monumental year for the company as it secured $60 million in new funding and more than doubled its customer base. VGS’ Zero Data approach to security and compliance eliminates organizations’ need to store sensitive information within their own systems. The company serves as a custodian for any type of sensitive … More

The post Very Good Security appoints Paul Machle as Chief Financial Officer appeared first on Help Net Security.

Hoplite Technology Anti-Phishing Bot: Protecting everyday users against phishing attacks

With an inherent emphasis in “privacy-by-default”, Hoplite Technology announced the new launch of a free anti-phishing solution named Anti-Phishing Bot (APBot) to protect everyday users against phishing attacks. A phishing email is a form of cyberattacks where cybercriminals impersonate a trusted party to gain access to sensitive information. Due to the lack of ways to verify the identity of the senders, everyday users without technical trainings will often find it difficult to distinguish a phishing … More

The post Hoplite Technology Anti-Phishing Bot: Protecting everyday users against phishing attacks appeared first on Help Net Security.

Ring launches video End-to-End Encryption for compatible Ring Doorbells and Cams

Ring announced the launch of video End-to-End Encryption for compatible Ring Doorbells and Cams, providing an advanced, opt-in security feature for customers who want to add an additional layer of security to their videos. Ring is the first major smart home security provider to offer customers this advanced security option. The feature began rolling out to customers today as a technical preview and Ring is soliciting feedback from its customers on their experience with the … More

The post Ring launches video End-to-End Encryption for compatible Ring Doorbells and Cams appeared first on Help Net Security.

Twenty20 Solutions’ enhanced AI technology drives visibility, security and automation

Twenty20 Solutions announces its launch of enhanced Artificial Intelligence (AI) technology with advanced visual detection and classification capabilities designed to maximize operational efficiency for its customers. In addition, the company unveiled an expanded technology roadmap that includes new AI-enabled analytics to drive higher levels of visibility, security and automation. “Developing AI-enabled technology that helps customers automate their day-to-day on-site activities and keep their assets, people and businesses safe and compliant is our company’s main focus,” … More

The post Twenty20 Solutions’ enhanced AI technology drives visibility, security and automation appeared first on Help Net Security.

Oracle APEX low-code application development platform now available as a standalone OCI service

Oracle is making its APEX low-code development platform available as a managed cloud service that developers can use to build data-driven enterprise applications quickly and easily. Oracle APEX Application Development expands on two decades of APEX functionality already used by 500,000 developers as an easy-to-use, browser-based service for creating modern Web and mobile apps. While the original APEX platform was only available as part of the Oracle Database, APEX Application Development is available as a … More

The post Oracle APEX low-code application development platform now available as a standalone OCI service appeared first on Help Net Security.

Skyworks Solutions ships its high efficiency small cell PA with a bandwidth of 200 MHz at +28 dBm

Skyworks Solutions announced a significant milestone with the shipment of over 1 million of its SKY66318-21 power amplifier (PA), the industry’s first high efficiency small cell PA with a bandwidth of 200 MHz at +28 dBm. This achievement highlights Skyworks accelerating the adoption of 5G by enabling enhanced 5G connections and powering more efficient range extension for small cells. To demonstrate the benefits of this exciting new technology, Skyworks also collaborated with Xilinx, Inc. to … More

The post Skyworks Solutions ships its high efficiency small cell PA with a bandwidth of 200 MHz at +28 dBm appeared first on Help Net Security.

This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs

Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, learn about a ransomware group that walked away with 2,200 Bitcoin: More than $33 million based on the current Bitcoin exchange rate. Also, read about this month’s Patch Tuesday security updates from Microsoft, including patches for 112 vulnerabilities.

 

Read on:

Microsoft Patch Tuesday Update Fixes 17 Critical Bugs

Microsoft’s November Patch Tuesday roundup of security fixes tackled an unusually large crop of remote code execution (RCE) bugs. Twelve of Microsoft’s 17 critical patches were tied to RCE bugs. In all, 112 vulnerabilities were patched by Microsoft, with 93 rated important, and two rated low in severity. In this article, ZDI’s Dustin Childs shares his thoughts on Microsoft’s removal of descriptions from CVE overviews.

An Old Joker’s New Tricks: Using Github to Hide Its Payload

Trend Micro detected a new Joker malware version on a sample on Google Play, which utilizes Github pages and repositories in an attempt to evade detection. The app promised wallpapers in HD and 4K quality and was downloaded over a thousand times before it was removed from the Play Store by Google after being reported as malicious.

NETGEAR Router, WD NAS Device Hacked on First Day of Pwn2Own Tokyo 2020

Due to the coronavirus pandemic, this year’s Pwn2Own Tokyo was turned into a virtual event coordinated by ZDI from Toronto, Canada. On the first day of the event, the NETGEAR Nighthawk R7800 router, Western Digital My Cloud Pro series PR4100 NSA device and Samsung Smart TV were targeted and $50,000 was awarded among teams STARLabs, Trapa Security and Team Flashback.

Developing Story: COVID-19 Used in Malicious Campaigns

As the number of those afflicted with COVID-19 continues to surge by thousands, malicious campaigns that use the disease as a lure likewise increase. In this report, Trend Micro researchers share samples on COVID-19 related malicious campaigns. The report also includes detections from other researchers.

IoT Security is a Mess. These Guidelines Could Help Fix That

The supply chain around the Internet of Things (IoT) has become the weak link in cybersecurity, potentially leaving organizations open to cyberattacks via vulnerabilities they’re not aware of. However, new guidelines from the European Union Agency for Cybersecurity (ENISA) aims to ensure that security forms part of the entire lifespan of IoT product development.

US Department of Energy Launches New Program for Technology Security Managers

The US Department of Energy (DOE) recently launched the Operational Technology (OT) Defender Fellowship. Another milestone from the Department in enhancing the US’s critical infrastructure. In collaboration with DOE’s Idaho National Laboratory (INL) and the Foundation for Defense of Democracies’ (FDD) Center for Cyber and Technology Innovation (CTTI), the OT Defender Fellowship hopes to expand the knowledge of primary US front-line critical infrastructure defenders.

Ransomware Gang is Raking in Tens of Millions of Dollars

A ransomware organization has raked in tens of millions of dollars, according to a new report. The organization, identified as group “One,” walked away with 2,200 Bitcoin, according to a report by Advanced Intelligence. That’s more than $33 million based on the current Bitcoin exchange rate.

CISA Braces for 5G with New Strategy, Initiatives

The Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) released its 5G Strategy, ensuring the federal government and its many states, local, tribal, territorial, and private sector partners are secure as when the 5G technology arrives. The agency’s document hoped to expand on how the US government would secure 5G infrastructure both in the country and abroad.

Hacker-for-Hire Group Targeting South Asian Organizations

There’s a new cyber mercenary group on the block, and they’re going after targets in more than a dozen countries globally, according to a BlackBerry research report. The hack-for-hire shop, which BlackBerry is calling “CostaRicto,” has largely gone after targets in South Asia, especially in India, Bangladesh and Singapore. Some of its targeting was also located in Africa, the Americas, Australia and Europe.

Defense in Depth, Layered Security in the Cloud

In this blog, Trend Micro’s vice president of cybersecurity, Greg Young, discusses the evolution of network security into how it manifests itself today, how network security has looked up until now, how the future of network security looks and why security teams need layered protection in the cloud.

Surprised by Microsoft’s decision to remove the description section from Patch Tuesday bulletins?  Share your thoughts in the comments below or follow me on Twitter to continue the conversation: @JonLClay.

The post This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs appeared first on .

This Week in Security News: US Cyber Command Exposes New Russian Malware and REvil Ransomware Gang ‘Acquires’ KPOT Malware

Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, learn about eight new malware samples that were developed and deployed by Russian hackers in recent attacks. Also, read about how the operators of the REvil ransomware strain have “acquired” the source code of the KPOT trojan in an auction held on a hacker forum last month.

Read on:

Beware a New Google Drive Scam Landing in Inboxes

Scammers just found a new phishing lure to play with: Google Drive. A flaw in Drive is being exploited to send out seemingly legitimate emails and push notifications from Google that, if opened, could land people on malicious websites. The smartest part of the scam is that the emails and notifications it generates come directly from Google.

What Are the Best Options for Cybersecurity Protection for Small Businesses?

For Workplace IT, providing the best cybersecurity protection for their company’s hundreds of small business clients is critical. Workplace IT relies exclusively on Trend Micro to ensure that its customers have the best cybersecurity protection available. Partnering with one security vendor makes it easy for the company to focus on other issues, knowing that security is handled comprehensively and consistently.

REvil Ransomware Gang ‘Acquires’ KPOT Malware

The operators of the REvil ransomware strain have “acquired” the source code of the KPOT trojan in an auction held on a hacker forum last month. The sale took place after the KPOT malware author decided to auction off the code, desiring to move off to other projects, and was organized as a public auction on a private underground hacking forum for Russian-speaking cyber-criminals.

Encouraging the Next Generation of Cybersecurity Stars to Join the Industry

At its core, Trend Micro has a passion for education and a desire to grow the cybersecurity industry with talented, dedicated professionals. The two are closely linked: If we can introduce cyber skills into schools at an earlier age, then more young people will be encouraged to start a career in cybersecurity. That’s why Trend Micro is running a new virtual event for university students in November, during NIST NICE Cybersecurity Career Awareness Week.

Cybersecurity Threats to Corporate America are Present Now ‘More Than Ever,’ SEC Chair Says

Securities and Exchange Commission (SEC) Chairman Jay Clayton is telling corporate America it needs to be more vigilant on security. In an interview with CNBC, Clayton stressed that significant cybersecurity threats remain, despite the ongoing coronavirus pandemic and election season. In October alone, the Cybersecurity and Infrastructure Security Agency (CISA) put out 30 cyber alerts across various industries and business sizes, as well as consumers.

US Cyber Command Exposes New Russian Malware

US Cyber Command has exposed eight new malware samples that were developed and deployed by Russian hackers in recent attacks. Six of the eight samples are for the ComRAT malware (used by the Turla hacking group), while the other two are samples for the Zebrocy malware (used by the APT28 hacking group).

SaltStack Discloses Critical Vulnerabilities, Urges Patching

SaltStack disclosed three new vulnerabilities, two of which are assessed to be critical, and is urging users to patch immediately. In an advisory, the organization announced it released a security update to address the vulnerabilities. While two vulnerabilities were discovered and submitted by “KPC” of Trend Micro’s Zero Day Initiative (ZDI), the advisory does not say how CVE-2020-25592 was found. Dustin Childs, ZDI communications manager, said they reported it to SaltStack privately in late August.

New Data Shows Just How Badly Home Users Overestimate IoT Security

A new survey from the National Cyber Security Alliance (NCSA) shows adult workers vastly overestimate the security of the internet devices in their homes. The survey polled 1,000 adults – 500 aged 18-34 and 500 aged 50-75 – and found that the overwhelming majority of both believed the internet of things (IoT) devices they owned were secure.

Over 23,000 Hacked Databases Shared Over Telegram and Discord

It was reported that over 50GB of data from 23,000 hacked databases have been shared by hackers across Telegram channels and two hacking forums. A total of 23,618 databases were able to be downloaded through the Mega file hosting service, amounting to a dataset of around 13 billion personal files. The link was later taken down following abuse reports but there are fears that the data has entered the public domain.

Deloitte’s ‘Test Your Hacker IQ’ Site Fails Itself After Exposing Database Username, Password in Config File

A website created for global consultancy Deloitte to quiz people on knowledge of hacking tactics has proven itself vulnerable to hacking. The site, found at the insecure non-HTTPS URL http://deloittehackeriq.com/, makes its YAML configuration file publicly accessible. And within the file, in cleartext, is the username and password for the site’s mySQL database.

Toymaker Mattel Hit by Ransomware Attack

Top toymaker Mattel revealed it was a victim of a ransomware attack that successfully encrypted some data and temporarily crippled a limited number of business functions. The disclosure was part of a U.S. Securities Exchange Commission (SEC) disclosure filed in late October. Mattel reported the attack occurred on July 28, 2020 and that, for the most part, it was mitigated quickly and had a minimal impact on the company.

Spike in Emotet Activity Could Mean Big Payday for Ransomware Gangs

There’s been a massive increase in Emotet attacks and cyber criminals are taking advantage of machines compromised by the malware to launch more malware infections as well as ransomware campaigns. The October 2020 HP-Bromium Threat Insights Report reports a 1,200% increase in Emotet detections from July to September compared to the previous three months.

How do you secure your IoT devices at home?  Share your thoughts in the comments below or follow me on Twitter to continue the conversation: @JonLClay.

The post This Week in Security News: US Cyber Command Exposes New Russian Malware and REvil Ransomware Gang ‘Acquires’ KPOT Malware appeared first on .

This Week in Security News: Trend Micro Researcher Uncover Two Espionage Backdoors Associated with Operation Earth Kitsune and Trickbot and Ransomware Attackers Plan Big Hit on U.S. Hospitals

Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, learn about how Trend Micro researchers uncovered two new espionage backdoors associated with the ‘Operation Earth Kitsune’ campaign. Also, read about how U.S. healthcare providers have been put on high alert over Trickbot malware and ransomware targeting the sector.

Read on:

Operation Earth Kitsune: A Dance of Two New Backdoors

Trend Micro recently published a research paper on Operation Earth Kitsune, a watering hole campaign aiming to steal information by compromising websites. Besides its heavy use of SLUB malware, Trend Micro researchers also uncovered two new espionage backdoors associated with the campaign: agfSpy and dneSpy, dubbed as such following the attackers’ three-letter naming scheme.

FBI Warning: Trickbot and Ransomware Attackers Plan Big Hit on U.S. Hospitals

U.S. healthcare providers, already under pressure from the COVID-19 pandemic, are on high alert over Trickbot malware and ransomware targeting the sector. Trickbot is one of the largest botnets in the world, against which Microsoft took U.S. legal action earlier this month in effort to gain control of its servers. Within a day of the seizure, Trickbot C&C servers and domains were replaced with new infrastructure.

Trend Micro HouseCall for Home Networks

While a home network provides numerous benefits, it can also expose its users to safety and privacy risks. Checking for those risks doesn’t need to be costly: Trend Micro’s Housecall for Home Networks (HCHN) solution scans the connected devices in home networks and detects those that pose security risks and is available for free.

Bug-Bounty Awards Spike 26% in 2020

According to a list of top 10 vulnerabilities by HackerOne, cross-site scripting (XSS) remained the most impactful vulnerability and reaped the highest rewards for ethical hackers in 2020 for the second year in a row, earning hackers $4.2 million in total bug-bounty awards in the last year, a 26-percent increase from what was paid out in 2019 for finding XSS flaws. Following XSS on the list: Improper access control, information disclosure, server-side request forgery (SSRF) and more.

Supply Chain Attacks in the Age of Cloud Computing: Risks, Mitigations, and the Importance of Securing Back Ends

Security is an aspect that every enterprise needs to consider as they use and migrate to cloud-based technologies. On top of the list of resources that enterprises need to secure are networks, endpoints, and applications. However, another critical asset that enterprises should give careful security consideration to is their back-end infrastructure which, if compromised, could lead to supply chain attacks.

U.S. Shares Information on North Korean Threat Actor ‘Kimsuky’

An alert released this week by the Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and the Cyber Command Cyber National Mission Force (CNMF) provides information on Kimsuky, a threat actor focused on gathering intelligence on “foreign policy and national security issues related to the Korean peninsula, nuclear policy, and sanctions” on behalf of the North Korean government. The advisory says the adversary has been active since 2012, engaging in social engineering, spear-phishing, and watering hole attacks.

76% of Applications Have at Least One Security Flaw

Most applications contain at least one security flaw and fixing those flaws typically takes months, a new Veracode report reveals. This year’s analysis of 130,000 applications found that it takes about six months for teams to close half the security flaws they find. The report also uncovered some best practices to significantly improve these fix rates.

Apps Infected with Adware Found on Google Play Store

Some 21 malicious Android apps containing intrusive adware were discovered on the Google Play Store, but most have now been removed, according to a report from Avast. These fraudulent mobile applications, disguised as Android gaming apps, had been downloaded more than 8 million times since they were made available in the store.

Patients in Finland Blackmailed After Therapy Records Were Stolen by Hackers

The confidential records of thousands of psychotherapy patients in Finland have been hacked and some are now facing the threat of blackmail. Attackers were able to steal records related to therapy sessions, as well as patients’ personal information including social security numbers and addresses, according to Vastaamo, the country’s largest private psychotherapy center.

Surprised by the Vastaamo hack and subsequent blackmail of patients?  Share your thoughts in the comments below or follow me on Twitter to continue the conversation: @JonLClay.

The post This Week in Security News: Trend Micro Researcher Uncover Two Espionage Backdoors Associated with Operation Earth Kitsune and Trickbot and Ransomware Attackers Plan Big Hit on U.S. Hospitals appeared first on .

This Week in Security News: Watering Hole Campaign Operation Earth Kitsune Spying on Users’ Systems and Fancy Bear Imposters Are on a Hacking Extortion Spree

week in security

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about a watering hole campaign Trend Micro dubbed ‘Operation Earth Kitsune’ that is spying on users’ systems through compromised websites. Also, read about how APT groups are threatening DDoS attacks against victims if they don’t send them bitcoin.

Read on:

Fancy Bear Imposters Are on a Hacking Extortion Spree

Radware recently published extortion notes that were sent to a variety of companies globally. The senders purport to be from the North Korean government hackers Lazarus Group, or APT38, and Russian state-backed hackers Fancy Bear, or APT28. The notes threaten that if the target doesn’t send bitcoin, powerful distributed denial of service (DDoS) attacks will be launched against the victim. Robert McArdle, Trend Micro’s director of our Forward-Looking Threat Research (FTR) team, comments on DDoS as an extortion method.

A Ride on Taiwan’s Self-Driving Bus

The self-driving bus is now being tested on the streets of downtown Taipei and more autonomous buses are being deployed in other places, including Germany, Japan and Canada. Since connected cars are still a relatively new technology, the dangers of these vehicles are unknown and mostly speculated. In this article, Trend Micro discusses potential security implications of these connected vehicles.

 U.S. Charges Russian Intelligence Officers in Major Cyberattacks

This week, the Justice Department unsealed charges accusing six Russian military intelligence officers of an aggressive worldwide hacking campaign that caused mass disruption and cost billions of dollars by attacking targets like a French presidential election, the electricity grid in Ukraine and the opening ceremony of the 2018 Winter Olympics.

 Operation Earth Kitsune: Tracking SLUB’s Current Operations

A watering hole campaign that Trend Micro has dubbed as Operation Earth Kitsune is spying on users’ systems through compromised websites. Using SLUB and two new malware variants, the attacks exploit vulnerabilities including those of Google Chrome and Internet Explorer.

Cybersecurity Company Finds Hacker Selling Info on 186 Million U.S. Voters

Trustwave says it found a hacker selling personally identifying information of more than 200 million Americans, including the voter registration data of 186 million. The revelation underscored how vulnerable Americans are to email targeting by criminals and foreign adversaries, even as U.S. officials announced that Iran and Russia had obtained voter registration data and email addresses with an eye toward interfering in the 2020 election.

Future Imperfect

In 2012, Trend Micro, the International Cyber Security Protection Alliance (ICSPA) and Europol’s European Cyber Crime Centre (EC3) collaborated on a white paper that imagined the technological advances of the coming 8 years, the societal and behavioral changes they may bring and the opportunities for malfeasance they could present. As we enter the 2020s, we now have the opportunity to objectively review the project against a number of success factors.

WordPress Deploys Forced Security Update for Dangerous Bug in Popular Plugin

WordPress sites running Loginizer, one of today’s most popular WordPress plugins with an install base of over one million sites, were forcibly updated this week to Loginizer version 1.6.4. This version contained a security fix for a dangerous SQL injection bug that could have allowed hackers to take over WordPress sites running older versions of the Loginizer plugin.

Just Leave That Docker API on the Front Porch, No One Will Steal It

Recently, a new type of Linux malware named “DOKI” has been discovered exploiting publicly accessible Docker API’s hosted in all major cloud providers. The manner in which threat actors are gaining access to container environments is a previously discovered technique, but the DOKI malware is something that has not been documented until now.

Adobe Fixes 16 Critical Code-Execution Bugs Across Portfolio

Adobe has released 18 out-of-band security patches in 10 different software packages, including fixes for critical vulnerabilities that stretch across its product suite. Two of the issues are out-of-bounds read flaws, (CVE-2020-24409, CVE-2020-24410); one is an out-of-bounds write bug (CVE-2020-24411). Tran Van Khang, working with Trend Micro Zero Day Initiative, is credited for the discoveries.

US Treasury Department Ban on Ransomware Payments Puts Victims in Tough Position

This month, the US Treasury Department’s Office of Foreign Assets Control (OFAC) warned organizations making ransomware payments that they risk violating economic sanctions imposed by the government against cybercriminal groups or state-sponsored hackers. The advisory has the potential to disrupt the ransomware monetization model, but also puts victims, their insurers and incident response providers in a tough situation.

What are your thoughts on the sanctions imposed by the government against cybercriminal groups or state-sponsored hackers?  Share your thoughts in the comments below or follow me on Twitter to continue the conversation: @JonLClay.

The post This Week in Security News: Watering Hole Campaign Operation Earth Kitsune Spying on Users’ Systems and Fancy Bear Imposters Are on a Hacking Extortion Spree appeared first on .

This Week in Security News: Cybercriminals Use Stolen Data and Hacking Tools as Prizes in Poker Games and Rap Battles and VirusTotal Now Supports Trend Micro ELF Hash

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how cybercriminals are passing the time during the COVID-19 pandemic with online poker games, where the prizes include stolen data. Also, read about how VirusTotal now supports Trend Micro ELF Hash (aka telfhash).

 

Read on:

Cybercriminals Use Stolen Data and Hacking Tools as Prizes in Poker Games and Rap Battles

Cybercriminals have put their own spin on passing time during the COVID-19 lockdown with online rap battles, poker tournaments, poem contests, and in-person sport tournaments. The twist is that the prize for winning these competitions is sometimes stolen data and tools to make cybercrime easier, according to new research from Trend Micro.

Becoming an Advocate for Gender Diversity: Five Steps that Could Shape Your Journey

Sanjay Mehta, senior vice president at Trend Micro, was recently named a new board member at Girls In Tech—a noted non-profit and Trend Micro partner working tirelessly to enhance the engagement, education, and empowerment of women in technology. In this blog, Sanjay shares five steps that you can use to become an ally for diversity in the workplace.

October Patch Tuesday: Microsoft Patches Critical, Wormable RCE Bug

In this month’s Patch Tuesday update, Microsoft pushed out fixes for 87 security vulnerabilities – 11 of them critical – and one of those is potentially wormable. There are also six bugs that were previously unpatched but publicly disclosed, which could give cybercriminals a leg up — and in fact at least one public exploit is already circulating for this group.

VirusTotal Now Supports Trend Micro ELF Hash

To help IoT and Linux malware researchers investigate attacks containing Executable and Linkable Format (ELF) files, Trend Micro created telfhash, an open-source clustering algorithm that helps cluster Linux IoT malware samples. VirusTotal has always been a valuable tool for threat research and now, with telfhash, users of the VirusTotal Intelligence platform can pivot from one ELF file to others.

New Emotet Attacks Use Fake Windows Update Lures

File attachments sent in recent Emotet campaigns show a message claiming to be from the Windows Update service, telling users that the Office app needs to be updated. Naturally, this must be done by clicking the Enable Editing button. According to the Cryptolaemus group, since yesterday, these Emotet lures have been spammed in massive numbers to users located all over the world.

Metasploit Shellcodes Attack Exposed Docker APIs

Trend Micro recently observed an interesting payload deployment using the Metasploit Framework (MSF) against exposed Docker APIs. The attack involves the deployment of Metasploit’s shellcode as a payload, and researchers said this is the first attack they’ve seen using MSF against Docker. It also uses a small, vulnerability-free base image in order for the attack to proceed in a fast and stealthy manner.

Barnes & Noble Warns Customers It Has Been Hacked, Customer Data May Have Been Accessed

American bookselling giant Barnes & Noble is contacting customers via email, warning them that its network was breached by hackers, and that sensitive information about shoppers may have been accessed. In the email to customers, Barnes & Noble says that it became aware that it had fallen victim to a cybersecurity attack on Saturday, October 10th.

ContentProvider Path Traversal Flaw on ESC App Reveals Info

Trend Micro researchers found ContentProvider path traversal vulnerabilities in three apps on the Google Play store, one of which had more than 5 million installs. The three applications include a keyboard customization app, a shopping app from a popular department store, and the app for the European Society of Cardiology (ESC). Fortunately, the keyboard and department store apps have both been patched by developers. However, as of writing this blog, the ESC app is still active.

Carnival Corp. Ransomware Attack Affects Three Cruise Lines

Hackers accessed personal information of guests, employees and crew of three cruise line brands and the casino operations of Carnival Corp. in a ransomware attack the company suffered on Aug. 15, officials have confirmed. Carnival Cruise Line, Holland America Line and Seabourn were the brands affected by the attack, which Carnival said they’re still investigating in an update on the situation this week.

Docker Content Trust: What It Is and How It Secures Container Images

Docker Content Trust allows users to deploy images to a cluster or swarm confidently and verify that they are the images you expect them to be. In this blog from Trend Micro, learn how Docker Content Trust works, how to enable it, steps that can be taken to automate trust validation in the continuous integration and continuous deployment (CI/CD) pipeline and limitations of the system.

Twitter Hackers Posed as IT Workers to Trick Employees, NY Probe Finds

A simple phone scam was the key first step in the Twitter hack that took over dozens of high-profile accounts this summer, New York regulators say. The hackers responsible for the July 15 attack called Twitter employees posing as company IT workers and tricked them into giving up their login credentials for the social network’s internal tools, the state’s Department of Financial Services said.

What is a DDoS Attack? Everything You Need to Know About Distributed Denial-of-Service Attacks and How to Protect Against Them

A distributed denial-of-service (DDoS) attack sees an attacker flooding the network or servers of the victim with a wave of internet traffic so big that their infrastructure is overwhelmed by the number of requests for access, slowing down services or taking them fully offline and preventing legitimate users from accessing the service at all. DDoS attacks are one of the crudest forms of cyberattacks, but they’re also one of the most powerful and can be difficult to stop.

Cyberattack on London Council Still Having ‘Significant Impact’

Hackney Council in London has said that a cyberattack earlier this week is continuing to have a “significant impact” on its services. Earlier this week, the north London council said it had been the target of a serious cyberattack, which was affecting many of its services and IT systems.

 

Surprised by the new Emotet attack?  Share your thoughts in the comments below or follow me on Twitter to continue the conversation: @JonLClay.

The post This Week in Security News: Cybercriminals Use Stolen Data and Hacking Tools as Prizes in Poker Games and Rap Battles and VirusTotal Now Supports Trend Micro ELF Hash appeared first on .

This Week in Security News: A Look Inside the Bulletproof Hosting Business and Amazon Prime Day Spurs Spike in Phishing, Fraud Attacks

week in security

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how cybercriminals secure their assets and survive in the business in a new Trend Micro report. Also, read about a how cybercriminals are tapping into Amazon’s Prime Day with phishing and malicious websites that are fraudulently using the Amazon brand.

Read on:

French Companies Under Attack from Clever BEC Scam

Trend Micro researchers observed a new modus operandi involving a clever BEC campaign that uses social engineering to target French companies. Malicious actors impersonated a French company in the metal fabrication industry that provides services to several organizations. They then registered a domain very similar to the legitimate one used by the business and used it to send emails to their targets. 

Amazon Prime Day Spurs Spike in Phishing, Fraud Attacks

Cybercriminals are tapping into Amazon’s annual Prime Day with researchers warning of a recent spike in phishing and malicious websites that are fraudulently using the Amazon brand. There has been a spike in the number of new monthly phishing and fraudulent sites created using the Amazon brand since August, the most significant since the COVID-19 pandemic forced people indoors in March.

CSO Insights: DataBank’s Mark Houpt on Looking Beyond Securing Infrastructures in the New Normal

The big move to working remotely wasn’t completely difficult for Mark Houpt, CISO at DataBank. After all, he has been doing so since before COVID-19. However, when the pandemic hit, DataBank, like many other companies across the globe, had to help most of their employees transition securely and smoothly to virtual work. Read up on the several important security considerations this experience highlighted.

240+ Android Apps Caught Showing Out-of-Context Ads

This summer, Google removed more than 240 Android applications from the Play Store for showing out-of-context ads and breaking a newly introduced Google policy against this type of intrusive advertising. Out-of-context ads are mobile ads that are shown outside an app’s normal container and appear as pop-ups or as full-screen ads.

Safe and Smart Connections: Securing IoT Networks for Remote Setups

As a result of our work-from-home (WFH) arrangements, there is an increased demand on networks as remote operations have created greater dependence on the IoT. Subsequently, now is a good time to re-examine the security of your network. Rather than only focusing on securing individual devices that can compromise a network, users should also secure the network to minimize threats across several devices.

Inside the Bulletproof Hosting Business

The use of underground infrastructure is inherent to the modus operandi of a cybercriminal. In Trend Micro’s Underground Hosting series, it differentiates how cybercrime goods are sold in marketplaces and what kinds of services are offered. In this final part of the Underground Hosting report series, Trend Micro explores the methods criminals employ to secure their assets and survive in the business.

Comcast Voice Remote Control Could be Turned into Spying Tool

The Comcast XR11 voice remote controller was recently found to be vulnerable and could be turned into a spying tool that eavesdrops on users. Discovered by researchers at Guardicore, the attack has been named WarezTheRemote and is said to be a very serious threat, considering that the remote is used for over 18 million devices across the U.S.

Transforming IoT Monitoring Data into Threat Defense

In the first half of 2020, there was a 70% increase in inbound attacks on devices and routers compared to the second half of 2019, which included attacks on IoT systems. To protect customers effectively by continuously monitoring trends in IoT attacks, Trend Micro examined Mirai and Bashlite (aka Qbot), two notorious IoT botnet malware types, and shares the figures relating to these botnets’ command and control (C&C) servers, IP addresses, and C&C commands.

Russia’s Fancy Bear Hackers Likely Penetrated a Federal Agency

Last week the Cybersecurity and Infrastructure Security Agency published an advisory that hackers had penetrated a US federal agency. Now, clues uncovered by a researcher at cybersecurity firm Dragos and an FBI notification to hacking victims obtained by WIRED in July suggest that it was Fancy Bear, a team of hackers working for Russia’s GRU also known as APT28.

Threat Research & XDR Combine to Stop Cybercrime

Like legitimate businesses across the globe seeking to improve their information security and protect their network infrastructure, cybercriminal businesses take similar precautions. Trend Micro Research released the final report in a series focused on this part of cybercriminal business: Underground hosting providers. Based on the report, it’s clear that understanding both the criminal business and the attacks themselves better prepares defenders and investigators to identify and eliminate threats.

Researchers Find Vulnerabilities in Microsoft Azure Cloud Service

As businesses are increasingly migrating to the cloud, securing the infrastructure has never been more important. According to research by Paul Litvak of Intezer Labs, two security flaws in Microsoft’s Azure App Services could have enabled a bad actor to carry out server-side request forgery (SSRF) attacks or execute arbitrary code and take over the administration server.

Cyber Security Awareness: A Critical Checklist

October 2020 marks the 17th year of National Cybersecurity Awareness Month, where users and organizations are encouraged to increase awareness of cybersecurity issues. To help raise awareness, Trend Micro’s Consumer Division breaks down of the security issues you should be aware of and shares tips about how you can protect yourself and your family while working, learning, or gaming at home.

The Basics of Keeping Kubernetes Cluster Secure: Worker Nodes and Related Components

In part one of this blog series, Trend Micro talked about the different ways developers can protect control plane components, including Kube API server configurations, RBAC authorization, and limitations in the communication between pods through network policies. In this second part, Trend Micro focuses on best practices that developers can implement to protect worker nodes and their components.

Are you surprised that Comcast voice activated remote controllers could be turned into a spying tool?  Share your thoughts in the comments below or follow me on Twitter to continue the conversation: @JonLClay.

The post This Week in Security News: A Look Inside the Bulletproof Hosting Business and Amazon Prime Day Spurs Spike in Phishing, Fraud Attacks appeared first on .

This Week in Security News: Linkury Adware Caught Distributing Full-Blown Malware and Cross-Platform Modular Glupteba Malware Uses ManageX

week in security

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how an adware family known primarily for distributing browser hijackers, Linkury, has been caught distributing malware. Also, read about a newly uncovered strain of the Glupteba trojan.

 

Read on:

Cross-Platform Modular Glupteba Malware Uses ManageX

Trend Micro recently encountered a variant of the Glupteba trojan and reported its attacks on MikroTik routers and updates on its command and control (C&C) servers. The use of ManageX, a type of modular adware that Trend Micro has recently analyzed, is notable in this newly uncovered strain as it aims to emphasize the modularity and the cross-platform features of Glupteba as seen through its code analysis.

Phishing Attack Targets Microsoft 365 Users with Netflix & Amazon Lures

Security researchers have been tracking a phishing campaign that abuses Microsoft Office 365 third-party application access to obtain specific resources from victims’ accounts. The attacker, dubbed TA2552, mostly uses Spanish-language lures and a narrow range of themes and brands. These attacks have targeted organizations with a global presence but seem to choose victims who likely speak Spanish, according to a report from Proofpoint researchers.

New Report Suggests the Bug Bounty Business is Recession-Proof

A new report from HackerOne presents data suggesting that the bug bounty business might be recession-proof, citing increases in hacker registrations, monthly vulnerability disclosures and payouts during a pandemic-induced economic downturn. Brian Gorenc, senior director of vulnerability research and director of Trend Micro’s Zero Day Initiative program, shared that he’s seen bug bounty activity increase with ZDI publishing 1,045 vulnerability advisories in all of 2019 and 1,235 already in 2020.

Identity Fraud: How to Protect Your Identity Data, Accounts and Money During the Coronavirus Crisis

We’ve all been spending more time online since the pandemic hit, and as a result we’re sharing more personal and financial information online with each other and with organizations. Unfortunately, as ever, there are bad guys around every digital corner looking for this. Personally identifiable information (PII) is the currency of internet crime, and cyber-criminals will do whatever they can to get it.

Linkury Adware Caught Distributing Full-Blown Malware

An adware family known primarily for distributing browser hijackers has been caught distributing malware, security researchers said at the Virus Bulletin 2020 security conference. Its main method of distribution is the SafeFinder widget, a browser extension ironically advertised as a way to perform safe searches on the internet. K7 researchers say that in recent cases they analyzed, the SafeFinder widget has now also begun installing legitimate malware, such as the Socelars and Kpot infostealer trojans.

Chinese APT Group Targets Media, Finance, and Electronics Sectors

Cybersecurity researchers have uncovered a new espionage campaign targeting media, construction, engineering, electronics, and finance sectors in Japan, Taiwan, the U.S. and China. Linking the attacks to Palmerworm (aka BlackTech), likely a China-based advanced persistent threat (APT), the first wave of activity associated with this campaign began last year in August 2019.

InterPlanetary Storm Botnet Infects 13K Mac, Android Devices

A new variant of the InterPlanetary Storm malware has been discovered, which comes with fresh detection-evasion tactics and now targets Mac and Android devices (in addition to Windows and Linux, which were targeted by previous variants of the malware). Researchers say the malware is building a botnet with a current estimated 13,500 infected machines across 84 countries worldwide – and that number continues to grow.

More Americans Share Social Security, Financial and Medical Information than Before the Pandemic

A new survey has shown that consumer willingness to share more sensitive data – social security numbers, financial information and medical information – is greater in 2020 than in both 2018 and 2019. According to the NYC-based scientific research foundation ARF’s (Advertising Research Foundation) third annual privacy study, contact tracing is considered a key weapon in the fight against COVID-19.

Do you feel like you are more willing to share sensitive information online since the pandemic began? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: @JonLClay.

The post This Week in Security News: Linkury Adware Caught Distributing Full-Blown Malware and Cross-Platform Modular Glupteba Malware Uses ManageX appeared first on .