Traditional SIEM platforms no longer meet the needs of security practitioners

Panther Labs released the findings from their report which surveyed over 400 security professionals who actively use a SIEM platform as part of their job, including CISOs, CIOs, CTOs, security engineers, security analysts, and security architects, to g… Continue reading Traditional SIEM platforms no longer meet the needs of security practitioners

Cyberattacks Use Office 365 to Target Supply Chain

Malicious actors have a history of trying to compromise users’ Office 365 accounts. By doing so, they can tunnel into a network and use their access to steal sensitive information. But they need not stop there. They can also single out other entities with which the target does business for supply chain cyberattacks. Office-Related Cyberattacks […]

The post Cyberattacks Use Office 365 to Target Supply Chain appeared first on Security Intelligence.

Continue reading Cyberattacks Use Office 365 to Target Supply Chain

Threat Modeling: The Key to Dealing With 5G Security Challenges

With 5G reshaping the smartphone market, 5G security needs to keep up. Almost one in three smartphones sold in the first quarter of 2021 can connect to a 5G network. That’s just one year after the world’s first commercial 5G network emerged in South Korea. Such growth helped annual shipment numbers of 5G-enabled smartphones exceed […]

The post Threat Modeling: The Key to Dealing With 5G Security Challenges appeared first on Security Intelligence.

Continue reading Threat Modeling: The Key to Dealing With 5G Security Challenges

SSDF: The Key to Defending Against Supply Chain Cyberattacks

For reasons we all know, software supply chain attacks took on new meaning near the end of 2020. This hasn’t changed over this year. One of the best modern ways to combat these cyberattacks is to integrate a secure software development framework (SSDF) into a vendor’s software development life cycle (SDLC). Why is this such […]

The post SSDF: The Key to Defending Against Supply Chain Cyberattacks appeared first on Security Intelligence.

Continue reading SSDF: The Key to Defending Against Supply Chain Cyberattacks

5 Ways to Defend Against Supply Chain Cyberattacks

Cutting corners happens, more so in high-stakes, high-speed jobs. But from employees honest enough to admit when they push vulnerable code live, we can put together a portfolio of products shipped broken. A new study by Osterman Research found a concerning trend — 81% of developers admitted to knowingly pushing vulnerable code live. And that […]

The post 5 Ways to Defend Against Supply Chain Cyberattacks appeared first on Security Intelligence.

Continue reading 5 Ways to Defend Against Supply Chain Cyberattacks

Microsoft catches hackers using Morse Code to help cover their tracks

Clever hackers use a range of techniques to cover their tracks on a target computer, from benign-looking communication protocols to self-erasing software programs. It’s not very often, though, that digital attackers turn to Morse Code, a 177-year-old signaling system, for operational security. Yet that’s exactly what played a part in a year-long phishing campaign that Microsoft researchers outlined on Thursday. Morse Code — a method of representing characters with dots and dashes popularized by telegraph technology — was one of several methods that the hackers, whom Microsoft did not identify, used to obscure malicious software. It’s a reminder that, for all of their complexities, modern offensive and defensive cyber measures often rest on the simple concept of concealing and cracking code. Hackers were sending select targets fake invoices to try to convince them to cough up their passwords and, in some cases, to collect IP addresses and location data of […]

The post Microsoft catches hackers using Morse Code to help cover their tracks appeared first on CyberScoop.

Continue reading Microsoft catches hackers using Morse Code to help cover their tracks

Enterprises turning to cybersecurity providers to fight off cyberattacks

Enterprises in the U.S. are turning to cybersecurity providers offering best-of-breed technologies that can help them fend off cyberattacks from sophisticated criminals, according to a report published by Information Services Group (ISG). Cybersecurity… Continue reading Enterprises turning to cybersecurity providers to fight off cyberattacks

How to Make Threat Detection Better?

I keep coming to the same topic over and over — why are we still bad at detecting threats?
I’ve lamented on this a few times, either touching on general difficulties with detection, its uncertainty or highlighting the fragile detections people write. I… Continue reading How to Make Threat Detection Better?

XDR: Security’s new frontier

As enterprises transform their IT environment and workforce, finding the right security approach is critical for success. Without the proper protective measures in place, moving services to the cloud can introduce a great deal of risk. For a truly futu… Continue reading XDR: Security’s new frontier

Zero day malware reached an all-time high of 74% in Q1 2021

74% of threats detected in Q1 2021 were zero day malware – or those for which a signature-based antivirus solution did not detect at the time of the malware release – capable of circumventing conventional antivirus solutions, according to WatchGuard. T… Continue reading Zero day malware reached an all-time high of 74% in Q1 2021