Monero Cryptominer Attack Exploits Exchange Server Flaw

It didn’t take threat actors long to jump on a vulnerability affecting Microsoft Exchange mail server software. While exploits involving an array of malware from ransomware to webshells are well-documented, Sophos researchers report that other payload… Continue reading Monero Cryptominer Attack Exploits Exchange Server Flaw

U.S. Fingers Putin’s Cozy Bear for SolarWinds Attacks

To the surprise of precisely nobody, the NSA, FBI and CISA agreed that last year’s SolarWinds supply-chain attack was orchestrated by the Russian state.
The post U.S. Fingers Putin’s Cozy Bear for SolarWinds Attacks appeared first on Security Boulevar… Continue reading U.S. Fingers Putin’s Cozy Bear for SolarWinds Attacks

Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks

In our newest whitepaper, “Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks,” we dive into how traditional cybersecurity tools work, why this fundamentally limits them from being able to detect zero-day or pre… Continue reading Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks

YT$AW: FBI Cleans Up Exchange Servers, NSA Tips Microsoft 4 More Bugs

Your tax dollars at work: The FBI and NSA have been helping fix the mess caused by Microsoft Exchange hacking.
The post YT$AW: FBI Cleans Up Exchange Servers, NSA Tips Microsoft 4 More Bugs appeared first on Security Boulevard.
Continue reading YT$AW: FBI Cleans Up Exchange Servers, NSA Tips Microsoft 4 More Bugs

Son of Stuxnet? Iran Nuke Site Hacked ‘by Israel’ (Again)

Iran’s Nantaz nuclear centrifuge facility went dark yesterday. Sources say it was an Israeli cyberattack—another one. But something doesn’t add up.
The post Son of Stuxnet? Iran Nuke Site Hacked ‘by Israel’ (Again) appeared first on Security Boulevard… Continue reading Son of Stuxnet? Iran Nuke Site Hacked ‘by Israel’ (Again)

Today, You Really Want a SaaS SIEM!

One thing I did not expect to see in 2021 is a lot of people complaining about how difficult their SIEM is to operate.
Let’s explore this topic for the (n+1)-th time. And let me tell you … that “n” is pretty damn large since my first involvement with S… Continue reading Today, You Really Want a SaaS SIEM!

Understanding EtterSilent and the Cybercrime Supply Chain

The buzz around a new maldoc builder that’s quickly becoming the favorite of cybercriminals mirrors the behavior around other popular products in a legitimate marketplace – that could be good news for defenders. Just like buyers who line up to b… Continue reading Understanding EtterSilent and the Cybercrime Supply Chain

Facebook Sucks: Huge 500M-User Breach ‘Is Your Fault’

Last week’s revelation of a half-billion-user leak is still reverberating around the news cycle. It’s like car-crash TV.
The post Facebook Sucks: Huge 500M-User Breach ‘Is Your Fault’ appeared first on Security Boulevard.
Continue reading Facebook Sucks: Huge 500M-User Breach ‘Is Your Fault’

Extending NDR visibility in AWS IaaS

By Vijit Nair, Sr. Director, Product Management, Corelight Comprehensive visibility is challenging in a cloud environment. While these environments are rich sources of telemetry and logs, it is challenging for security teams to ensure that logging is c… Continue reading Extending NDR visibility in AWS IaaS

Incremental Stacking of Correlative Analysis Platforms Will Ultimately Prove Ineffective and Costly

On the surface, an “incremental stacking” approach to correlative analysis platforms like SIEM, XDR and UEBA is logical. Organizations can overcome some of the inherent limitations present in their security solutions by adding a network traffic analysi… Continue reading Incremental Stacking of Correlative Analysis Platforms Will Ultimately Prove Ineffective and Costly