How do I select a network detection and response solution for my business?

Network detection and response (NDR) solutions enable organizations to improve their threat response, they help protect against a variety of threats, and also provide visibility into what is actually on the network. To select an appropriate network det… Continue reading How do I select a network detection and response solution for my business?

Enterprise and public sector leaders join Awake Security advisory board

Awake Security announced a cohort of enterprise and public sector leaders that have joined its advisory board. The multidisciplinary team comprises experts from across the security industry, including Richard Clarke, a leading global expert on national… Continue reading Enterprise and public sector leaders join Awake Security advisory board

HUGE Google Chrome Spyware Ring: 111 Add-ons,15K Domains

Thought Google Chrome was safe? Think again. Researchers find enormous mess of browser extensions that spy on you.
The post HUGE Google Chrome Spyware Ring: 111 Add-ons,15K Domains appeared first on Security Boulevard.
Continue reading HUGE Google Chrome Spyware Ring: 111 Add-ons,15K Domains

Google Yanks 106 ‘Malicious’ Chrome Extensions

Trojan Chrome browser extensions spied on users and maintained a foothold on the networks of financial services, oil and gas, media and entertainment, healthcare and pharmaceuticals and government organizations. Continue reading Google Yanks 106 ‘Malicious’ Chrome Extensions

How hackers used malicious Chrome extensions in a mass spying campaign

A sweeping set of surveillance campaigns has hit Google Chrome users, leading to nearly 33 million downloads of malicious software in the last three months, researchers at California-based Awake Security said Thursday. The researchers believe the unidentified hackers used Chrome extensions and other malicious tools — along with domains issued by a single registrar — to spy on computer users in sectors such as oil and gas, finance and health care. The hackers “were very effective in reaching a large number of industries and subverting controls that were in place,” said Gary Golomb, Awake Security’s cofounder and chief scientist. U.S. government contractors were among those targeted, Golomb said. He declined to identify the victims. The discovery exposes another gap in web browser security despite pledges from Google and other vendors to proactively block malicious code from appearing in their official download stores. After being tipped off by Golomb’s team, Google removed […]

The post How hackers used malicious Chrome extensions in a mass spying campaign appeared first on CyberScoop.

Continue reading How hackers used malicious Chrome extensions in a mass spying campaign

Cybersecurity during the pandemic: Try these security solutions for free!

In order to help global organizations of all sizes address cybersecurity during the COVID-19 pandemic, a number of vendors provide free (time-limited) access to their solutions. All of the offers below are available immediately, and they cover a number… Continue reading Cybersecurity during the pandemic: Try these security solutions for free!

Awake Security and Google Cloud enable businesses to enhance their cloud security

Awake Security, the only advanced network traffic analysis company that delivers answers, not alerts, has unveiled a technology partnership with the Google Cloud Platform (GCP). Awake can now protect organizations’ hybrid and Google Cloud deployments w… Continue reading Awake Security and Google Cloud enable businesses to enhance their cloud security

Product showcase: Awake Security Network Traffic Analysis Platform

Security experts profess that enterprise organizations must assume their network is already compromised. Cyber-attacks use network communications for malware distribution, command and control, and data exfiltration. With the right tools, security profe… Continue reading Product showcase: Awake Security Network Traffic Analysis Platform

Tolly report: Evaluating the evolution of network traffic analysis technology

Network Traffic Analysis has been rapidly evolving to counter the increased sophistication of threats experienced by organizations worldwide. Test methodologies and tools are not yet available which provide security professionals with the ability to te… Continue reading Tolly report: Evaluating the evolution of network traffic analysis technology