News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

With AI-based NDR against ransomware
With AI-based NDR against ransomware

Ransomware threats are constantly increasing and evolving. AI-supported NDR (Network Detection and Response) systems can keep up better and therefore offer more protection. According to the Swiss security company Exeon Analytics, with the emergence of the Akira ransomware, large companies in particular and those tied to Kritis or NIS 2 are facing a new danger, as there is currently no decryptor for the current versions of the malware and the new group is mainly focuses on victims from whom it can extort large ransoms. According to Erismann, many SIEM systems (Security Information and Event Management) offer...

Read more

Defend Storm-0558 attacks with machine learning
B2B Cyber ​​Security ShortNews

Cybersecurity systems based on machine learning identify attacks by detecting deviations from normality. According to security specialists at Exeon, this could have prevented the attack by the APT group Storm-0558. According to the Swiss security specialists at Exeon, the attack by the suspected Chinese hacker group Storm-0558 on a large number of government agencies and other organizations could have been prevented. The attackers had stolen a signing key from Microsoft. They were then able to use this to issue working access tokens for Outlook Web Access (OWA) and Outlook.com and hack emails and their attachments. An error in the…

Read more

NDR: Faster response to cyber threats
B2B Cyber ​​Security ShortNews

NETSCOUT's new generation Omnis Cyber ​​Intelligence (OCI) solution helps detect threats in real time. The Network Detection and Response (NDR) solution reduces response time. NETSCOUT, a leading provider of enterprise performance management, carrier service assurance, cybersecurity and DDoS protection solutions, announced its next-generation Omnis Cyber ​​Intelligence (OCI) solution. OCI is an advanced Network Detection and Response (NDR) solution that leverages highly scalable Deep Packet Inspection (DPI) and multiple methods to detect threats at the origin of packet capture. This is used for real-time threat detection and enables historical investigation…

Read more

Shields up: free risk assessment with Network Detection and Response
Shields up: free risk assessment with network detection and response

The invasion of Ukraine puts the cybersecurity community on high alert; ExtraHop uses AI-powered network intelligence to assess security controls and detect attack activity. ExtraHop encourages organizations to adopt the 'Shields Up Guidance' and offers a free risk assessment. ExtraHop, the leading provider of cloud-native network detection and response, announces that it will offer a free Shields Up evaluation to interested and eligible companies. The Russian invasion of Ukraine has put the world on high alert for retaliatory cyberattacks. Government agencies around the world have guidelines for the…

Read more

Cloud threat defense against advanced cyber attacks
Cloud threat defense against advanced cyber attacks

ExtraHop launches a new level of cloud threat prevention to identify and isolate advanced cyber attacks. Reveal(x) 360 for AWS now applies advanced AI to all network telemetry sources, providing continuous visibility into malicious activity without requiring development resources. ExtraHop, the leading provider of cloud-based Network Detection and Response (NDR), today announced that it has added threat intelligence for Amazon Web Services (AWS) to Reveal(x) 360. ExtraHop Reveal(x) 360 now offers advanced AI on top of layers of network telemetry to create a “threat heatmap” specifically designed to detect attacks like ransomware with associated…

Read more

Network detection and response to secure cloud workloads
Network detection and response to secure cloud workloads

The importance of network data in securing cloud workloads. Network data offer unique insights and the necessary context to ensure transparency and close security gaps in the cloud via network detection and response. There are many ways to monitor and protect cloud workloads, including third-party agent-based solutions, cloud provider monitoring and logging services, cloud perimeter firewalls, and WAFs. As with everything in life, security technologies also have certain advantages and disadvantages, so that companies often use a variety of security solutions for cloud workloads, which depend on their regulatory environment, the desired security situation and their risk tolerance….

Read more