This week in Security: The Olympic games in Pyeonchang is hit by a “cyber event”; messaging app Telegram releases an update to address a flaw which allowed the remote distribution of malware via the improper handling of specific Unicode characters; and two new Malware Analysis Reports are released revealing specific details around HIDDEN COBRA/ HARDRAIN/ BADCALL activity.
Threat intelligence chat bots can perform research for you and can even be note takers or central aggregators of information. This year at Black Hat Asia 2018, we debut our threat intelligence chat bot “CyBot.” Find out how you can create your own CyBot in under an hour with our instructional sessions.
Steganography is the “art of hiding something within an object.” As our means to communicate change, it is no surprise that criminal and nation states have kept pace and evolved their capabilities from the analog world to the digital world.
Security researcher Siguza recently discovered a critical macOS vulnerability which affects versions of macOS and OS X from the latest 10.13 High Sierra all the way back to 10.2 Jaguar. Siguza calls it IOHIDeous.
In this episode of the InSecurity Podcast, host Shaun Walsh is joined by special guest Kip Boyle, Founder and CEO at Cyber Risk Opportunities, to discuss challenges in determining “reasonable cybersecurity” thresholds and maintaining them.
This week in Security: Strava, the popular activity-tracking app, reveals too much about customer’s ‘Privacy Zones;’ Google Chrome will soon start alerting users of non-HTTPS sites that their communication is not secure; and John Perry Barlow, co-founder of the Electronic Frontier Foundation and Freedom of the Press Foundation (and Grateful Dead lyricist), passes away.
CylancePROTECT Home Edition, the first next-generation security product designed for consumers that uses artificial intelligence to protect employees and their personal Windows and Mac devices, is now is now available for individual purchase by employees of Cylance corporate customers.
Cylance is pleased to announce new releases of their prevention-focused security products, CylancePROTECT® and CylanceOPTICS™, delivering capabilities designed to further decrease the noise and clutter of the security stack.
URSNIF is an infostealer that recently became the most active malware to hit the financial sector. URSNIF primarily targets banks but has been used to steal user credentials for email, private cloud access, e-commerce sites, and cryptocurrency trading.
URSNIF (Gozi) is a multifaceted malware family with an emphasis on information stealing that has been leveraged to exfiltrate sensitive data from targets, and has been particularly pervasive throughout 2016 and 2017. Since 2007, variants of the malware have been detected in Europe, Japan, and Australia, with more recent outbreaks in the US and UK.
The first inaugural Cylance User Group kicks off on February 22 at 6PM in Seattle, Washington. These User Groups give CylancePROTECT Administrators and peers the chance to network, share best practices, and stay up-to-date on both local and global community developments.
Cylance is proud to announce the promotion of Greg Silberman to Chief Privacy Officer, where he will oversee the implementation and enforcement of practices that manage data with the goal of making Cylance a leader in the artificial intelligence and security industries with respect to customer and employee privacy.
Phishing is a type of social engineering attack that involves attackers pretending to be trusted entities using email or websites. Security researcher Sabri Haddouche recently launched Mailsploit, a way to bypass the DMARC email authentication system in order to spoof email addresses in a way that exploits vulnerabilities in most major email clients.
This week in Security: Strava Labs releases their global heat map of fitness tracking app data, accidentally giving away potential locations of secret military bases in the process; the notorious Italian spyware development group, Hacking Team, makes another resurgence; and Facebook announces they have hired former White House policy director Nathaniel Gleicher to be their own director of cybersec...
The security stack gets bigger, the challenge to integrate more and more technical solutions gets increasingly complicated, the alerts keep increasing, the security budget is out of control – yet the attackers still get through and your SOC team is still on constant pager duty in a reactive nightmare scenario. Sound familiar? That’s Security Groundhog Day 2018…
Hancock Regional Hospital in Indiana recently discovered that their computers had been infected with SamSam ransomware. The hospital made the difficult decision to pay the four Bitcoin ransom ($55,000 USD) in order to get their files decrypted… despite having full backups of all of the data that SamSam encrypted.
After storming the globe with the Unbelievable and UNDRWRLD Tours, we are now bringing the events to you live! You're invited to an online event like no other as we continue to unearth the secrets of the cybercrime underworld.
2018 started off with a bang as the information security community had a meltdown over the ‘spectre’ of a new class of vulnerabilities which affect the core of every computing device: the central processing unit (CPU). Once news of the vulnerabilities bled into traditional news outlets, users rushed to protect themselves - allowing malicious actors to take full advantage of the chaos.
While pundits in all manner of fields are predicting that 2018 will be the year where Artificial Intelligence comes into its own, that promise really will hold true in cybersecurity, and particularly in the federal government. The need to provide far more robust and sure security to federal agencies is assuming an even greater importance.
When we started Cylance in 2012, we wanted the public to be empowered. We believe that prevention is possible, that mathematics can solve the cybersecurity problem at its core, predict attacks, and prevent their execution in real time. Now, we are saying “Thank You”!
When I joined Cylance, I was struck by one major differentiator between this company and the others, which is a clear and simple answer to why the company existed. Cylance exists to protect every person, system, and thing under the sun. We’re extremely proud that thousands of customers believe in our approach. Our goal is to continue to build platforms that solve the core problems, not simply addr...
Cylance today announced that it had surpassed $100M in trailing 12-month GAAP revenue in 2017. This represents 177 percent year-over-year growth due to the unwavering and fanatical support of over 3800 enterprise customers.
Data Privacy Day is January 28th, and it is designated as an annual effort to create awareness about the importance of respecting privacy, safeguarding data and enabling trust – three things that are very important to Cylance, our customers, investors, partners and employees.
This week in Security: Researchers uncover a massive malvertising network that served up one billion ad impressions affecting 62% of ad-monetized websites; a truncated PDF copy of Michael Wolff’s new book ‘Fire and Fury’ is distributed online (along with a complimentary backdoor); and the Skyfall and Solace attacks are revealed to be a hoax – and a somewhat unsettling social experiment.
A group of senators from both the Democratic and Republican parties recently introduced a bill in Congress that is intended to prevent foreign interference with American elections. The bill would allocate federal government resources to states and help states identify and prepare for election cyberattacks. The sponsors hope to make the legislation law before the 2018 midterm elections.
Do you know the story of the ant and the grasshopper? The point of the story is that you work before you have the problem. We know that in cybersecurity, because when it’s breach o’clock you better be ready. But to get there you need to be like the ant and put in the effort. Read on to find out how.