Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Morocco says it is investigating a journalist for receiving "foreign funding" for "intelligence services" days after rights group Amnesty alleged the government had used Israeli spyware to bug his phone. [Read More]
Akamai has mitigated a second record-setting DDoS attack since the beginning of June, one that peaked at 809 MPPS. [Read More]
Twitter has suspended the account of Distributed Denial of Secrets after it posted links to information on 200 law enforcement organizations. [Read More]
Twitter has informed business users that their billing information may have been exposed through their web browser’s cache. [Read More]
Technology services giant Cognizant has informed clients that the Maze ransomware attack it suffered in April 2020 resulted in personally identifiable and financial information being stolen. [Read More]
US broadband and networking semiconductor maker MaxLinear this week revealed that some of its operational systems were infected with Maze ransomware. [Read More]
A specialized CIA unit that developed hacking tools and cyber weapons didn’t do enough to protect its own operations and wasn't prepared to respond when its secrets were exposed, according to an internal report. [Read More]
T-Mobile on Monday suffered a major outage in the United States and it ended up being reported as a “massive” DDoS attack. [Read More]
United States House representatives last week sent a letter to Zoom to demand explanation for the communication platform’s decision to close the accounts of U.S.-based Chinese activists. [Read More]
Australian beverages giant Lion says its systems have been infected with a piece of ransomware that disrupted manufacturing processes and customer service. [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Marc Solomon's picture
We can make the Security Operations Center (SOC) a powerhouse by tearing down walls between the various security groups in an organization.
Devon Kerr's picture
How healthcare organizations used a trail of digital evidence to identify the type of attack they were experiencing and developed a remediation strategy.
Marc Solomon's picture
Security teams should be able to detect threats faster and use that knowledge to pivot and accelerate parallel investigations that are separate but related.
Seema Haji's picture
As OT environments evolve, security is key to thwarting attacks with the potential to cause large and costly disruptions.
Marc Solomon's picture
Marc Solomon reviews the list of five characteristics to see how Gartner defined an intelligence-driven SOC four years ago and compare that list to where we are today.
Gunter Ollmann's picture
CISOs should invest time in applying the resources of public cloud to bring automation, scalability, and AI to solving the given problem as a platform for all customers – past, present, and future.
Devon Kerr's picture
Organizations should plan beyond initial compromise and invest in technologies, personnel and methods that foster a more complete understanding.
Marc Solomon's picture
With a platform that can act as a virtual cybersecurity situation room, teams and team members can share the same pool of threat data and evidence to conduct investigations collaboratively.
Stan Engelbrecht's picture
Security teams should always be on the lookout for ways to become more proactive by predicting and anticipating their adversaries’ next moves
Marc Solomon's picture
Like the teams that progress through to the NCAA National Championship, you’ve now pared down “the threat landscape” to “your threat landscape” and set yourself up for success.