| Date | Title | Description |
| 23.12.2025 | AI-fuelled cyber onslaught to hit critical systems by 2026 | - |
| 25.06.2025 | Beyond the legacy: Rethinking SIEMs in an age of cyber escalation | - |
| 18.06.2025 | Are cybersecurity stocks a new safety trade? What the Israel-Iran conflict shows | - |
| 05.06.2025 | Открытые API и ИИ могут увеличить долю успешных атак на финсектор | - |
| 30.05.2025 | Why better data management is crucial for Australian Organisations facing cyber breaches | - |
| 30.05.2025 | AI-driven phishing attacks surge against Australian targets in 2024 | - |
| 20.05.2025 | Australia faces mounting cyber threats to vital infrastructure | - |
| 13.05.2025 | ClearVector raises $13M to expand identity-driven threat detection platform
Your vote of support is important to us and it helps us keep the content FREE.
One click below supports our mission to provi... | Identity-driven detection and response startup ClearVector Inc. announced today that it has raised $13 million in new funding to accelerate its mission to redefine cybersecurity by shifting the focus to identity-driven security.
Founded in ... |
| 08.05.2025 | How outsourcing and automation plug the cybersecurity skills gap | - |
| 06.05.2025 | AI arms race fuels surge in cybercrime & deepfake scams | - |
| 30.04.2025 | KnowBe4 Appoints Bryan Palma as President and CEO | KnowBe4, a Clearwater, FL-based cybersecurity platform that comprehensively addresses human risk management, announced that Bryan Palma has been appointed as a president and CEO.
Palma is a technology executive with over twenty-five years o... |
| 29.04.2025 | APAC CIOs face cyber threats despite rising security spend | - |
| 28.04.2025 | AI’s impact on cybersecurity for the Australian federal election | - |
| 25.04.2025 | AI enhances SOCs but human expertise vital against threats | - |
| 16.04.2025 | Australian councils urged to adopt managed security services | - |
| 11.04.2025 | AI boosts Australian cyber defences against rising threats | - |
| 08.04.2025 | Resilient cybersecurity stocks to navigate the market turmoil and compelling tech opportunities | - |
| 31.03.2025 | Indian cybersecurity startups attract capital amid growing market potential to counter AI-driven threats | - |
| 26.03.2025 | AI & data breaches drive rise in sextortion scams | - |
| 29.01.2025 | The Future of Learning and Security: How AI is Shaping Tomorrow's Workforce and Data Protection | In the rapidly evolving landscape of technology, two sectors are emerging as front-runners in innovation: education and data security. Companies like Infosys and Siemens AG are harnessing the power of generative AI to transform learning exp... |
| 28.01.2025 | Mitiga: Threat Detection And Solutions Company Raises $30 Million (Series B) | Mitiga (see Pulse 2.0 profile here), a threat detection, investigation, and response solution for Cloud and SaaS company announced that it has raised $30 million in funding. SYN Ventures led this financing round with active participation fr... |
| 23.01.2025 | Mitiga's $30 Million Boost: A New Era in Cloud Security | In the ever-evolving landscape of cybersecurity, Mitiga Security Inc. has just made waves. The New York City-based startup has secured $30 million in Series B funding, a move that signals its ambition to fortify its position in the cloud an... |
| 21.01.2025 | Mitiga secures $30M to expand cloud and SaaS incident response capabilities
Your vote of support is important to us and it helps us keep the content FREE.
One click below supports our mission to provi... | Cloud incident response company Mitiga Security Inc. today announced that it has raised $30 million in new funding to drive growth, enhance its artificial intelligence-driven platform and forge strategic alliances.
Founded in 2019, Mitiga o... |
| 13.12.2024 | Silent Push: A New Era in Cybersecurity Intelligence | In a world where cyber threats lurk like shadows, Silent Push emerges as a beacon of hope. This Reston, Virginia-based company has just secured $10 million in Series A funding, bringing its total to $22 million. The investment, co-led by Te... |
| 12.12.2024 | Silent Push: Preemptive Cybersecurity Intelligence Company $10 Million (Series A) | Silent Push – a leading preemptive cybersecurity intelligence company – announced a $10 million Series A funding round co-led by Ten Eleven Ventures and Stepstone Group LP. This and its early seed round bring its total funding to $22 millio... |
| 04.12.2024 | How Microsoft defends against 7000 password attackers per second | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
VentureBeat recently sat down (virtually) with Vasu Jakkal, corporate vice president of security, compliance, ide... |
| 20.11.2024 | BlackCloak Strengthens Commitment to Digital Protection for Executives and High Net Worth Individuals with Tracey Moon's Appointment as CMO | BlackCloak Strengthens Commitment to Digital Protection for Executives and High Net Worth Individuals with Tracey Moon’s Appointment as CMO
BlackCloak, a leader in Digital Executive Protection and Concierge Cybersecurity & Privacy™, ann... |
| 13.11.2024 | The Future of Warfare: AI and the Rise of Autonomous Weapons | The battlefield is evolving. The rise of artificial intelligence (AI) is reshaping how wars are fought. The U.S. military is at the forefront of this transformation, testing new technologies that could redefine combat. One such innovation i... |
| 13.11.2024 | MIND: Data Loss Prevention Company Raises $11 Million (Seed) | MIND, an upcoming leader in data loss prevention (DLP), emerged from stealth and revealed its breakthrough platform for enabling organizations to protect their most sensitive data. And MIND raised $11 million in seed round funding led by YL... |
| 13.11.2024 | US embassy urges Nigeria to strengthen security with technology | The United States Embassy in Abuja has advised the Nigerian government to harness the power of technology to enhance its security framework and build a safer, more resilient country.
Mr. Bradley Markwald, the embassy’s Senior Regional Secur... |
| 01.11.2024 | MIND's $11 Million Funding: A New Dawn in Data Protection | In the ever-expanding universe of data, MIND has emerged from the shadows. The Seattle-based cybersecurity firm recently secured $11 million in funding, signaling a bold step into the spotlight. This funding round, led by YL Ventures, attra... |
| 30.10.2024 | Data loss prevention firm MIND emerges from 'stealth mode' to raise $11 million | JERUSALEM : Cyber firm MIND, which protects sensitive data from leaks, said on Wednesday it raised $11 million in an early funding round as it emerges from so-called "stealth mode" after a year of working in secrecy with selected ... |
| 30.10.2024 | MIND Raises $11M in Funding | Itai Schwartz, Co-Founder and CTO, Eran Barak, Co-Founder and CEO and Hod Bin Noon, Co-Founder and VP of R&D. (Credit- Ohad Kab)
MIND, a Seattle, WA-based company which specializes in data loss prevention (DLP), raised $11M in funding.
... |
| 24.06.2024 | Cloud security is a shared responsibility – and AI can help | Most Australian enterprise organisations continue to invest heavily in the cloud. Revenue for the public cloud market in Australia is set to show an annual growth rate of 9.8 per cent between 2024 and 2028, indicating businesses will contin... |
| 10.06.2024 | Crowdstrike vs Trellix (2024): What Are The Main Differences? | Security threats are a major concern for businesses, as they can have a number of undesirable consequences, including customer data breaches or loss of sensitive data. To protect against these threats, many businesses are turning to endpoin... |
| 04.06.2024 | Mysterious corporate breaches could link to Snowflake cloud accounts | figcaption>span]:font-sans">
Cloud computing company Snowflake warned its customers over the weekend that hackers appear to be targeting accounts that don't use multifactor authentication (MFA).
Why it matters: The warning is the... |
| 03.06.2024 | Trend Micro, Nvidia Join Forces to Create AI-Powered Cybersecurity Tools | By Aldohn Domingo
Published Jun 3, 2024 12:06AM EDT
Share on Facebook Share on Twitter Share on LinkedIn Share on Reddit Share on Flipboard Share on Pocket
Trend Micro announced on Sunday it is working with AI chip giant Nvidia to create ne... |
| 15.05.2024 |
Reducing risk by enhancing organizational cybersecurity | In the contemporary digital landscape, one of the principal threats to an organization’s cybersecurity infrastructure stems from sophisticated email phishing attacks. The increasing complexity of these tactics necessitates a strategic appro... |
| 10.05.2024 | Google Cloud Partners with CrowdStrike to Transform AI-Native Cybersecurity | Jace Dela Cruz, Tech Times 10 May 2024, 05:05 am
Google Cloud has partnered with CrowdStrike to enhance cybersecurity through Mandiant's Incident Response (IR) and Managed Detection and Response (MDR) services, utilizing the CrowdStrike Fal... |
| 02.05.2024 | UnitedHealth Cyberattack: A Tale of Compromised Credentials and Ransomware | UnitedHealth Group, the largest U.S. health insurer, fell victim to a cyberattack in February that exposed the vulnerabilities of its IT systems. Hackers exploited a security flaw in Citrix software to gain access to the insurer's Change He... |
| 01.05.2024 | Hackers used compromised Citrix credentials to attack healthcare provider | US-based healthcare insurance company UnitedHealth Group disclosed that hackers broke into software supplier Change Healthcare IT systems in February using stolen credentials, which enabled them to log in to a Citrix remote access portal.
T... |
| 24.04.2024 | D.C. startup founded by ex-Defense Department hacker raises millions to help companies spot phishing scams | - |
| 16.04.2024 | Дорога кибербезопасность к 2025 году | - |
| 31.03.2024 | Unlocking the Mystery: Delving Into IT Security’s Inner Workings | Share
Tweet
Share
Share
Email
In the ever-evolving landscape of technology, the importance of IT security cannot be overstated. From safeguarding sensitive data to protecting against cyber threats, IT security plays a pivotal role in the su... |
| 31.03.2024 | Exploring the Depths: The Core Components of IT Security | Share
Tweet
Share
Share
Email
In today’s digital age, where technology permeates every aspect of our lives, ensuring the security of our information and systems has become paramount. As businesses rely more on digital infrastructure, the ri... |
| 20.03.2024 | Proofpoint: APAC Employees Are Choosing Convenience, Speed Over Cyber Security | CISOs know best practice information security management comes down to people as much as technology. Without employees and a robust security culture on your side, tech deployment will not stop threat actors, who continue to find their way i... |
| 04.03.2024 | Zero Trust Security Market registering at a CAGR of 18.5% and to generate $126.02 billion by 2031 | WILMINGTON, DE, UNITED STATES, March 4, 2024 /EINPresswire.com/ -- The zero trust security industry was valued at $23.61 billion in 2021, and is estimated to reach $126.02 billion by 2031, growing at a CAGR of 18.5% from 2022 to 2031.
Asia-... |
| 29.05.2023 | The Top 10 endpoint security challenges and how to overcome them | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
One of the main reasons companies keep being breached is that they don’t know how many endpoints a... |
| 30.08.2022 | How new CISOs should take on today’s growing threatscape | Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.
So, you’re a new CISO (or you’ve just hired a new CISO) who has the opportunity to turn around a long-standing tech sta... |
| 22.08.2022 | Why getting endpoint security right is crucial | Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.
Most organizations are behind on hardening their endpoints with zero trust, enabling cyberattackers to use malicious sc... |
| 23.05.2022 | Recovering from ransomware attacks starts with better endpoint security | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Ransomware attacks often succeed because endpoint... |
| 05.05.2022 | CrowdStrike vs FireEye: Compare EDR software | Image: momius/Adobe Stock
Business organizations worldwide battle with incidents of security breaches and data loss yearly. To mitigate some of these security threats, software engineers developed endpoint detection and response software so... |
| 29.04.2022 | Five Affordable Cyber Security Best Practices For Small Businesses | Participants hold their laptops in front of an illuminated wall at the annual Chaos Computer Club ... [+] (CCC) computer hackers' congress, called 29C3, on December 28, 2012 in Hamburg, Germany. (Photo by Patrick Lux/Getty Images) Getty Ima... |
| 29.04.2022 | Top advanced threat protection tools and solutions 2022 | Image: iStock/weerapatkiatdumrong
What is advanced threat protection?
What does advanced threat protection do?
How to choose advanced threat protection software
Best advanced threat protection software
Just as malicious actors refined virus... |
| 25.03.2022 | US charges four Russian spies for hacking Saudi oil facility and US nuclear power plant | The U.S. Department of Justice has announced charges against four Russian government employees for a years-long hacking campaign targeting critical infrastructure, including a U.S. nuclear power operator and a Saudi petrochemical facility.
... |
| 07.03.2022 | What to Make of Microsoft’s Year in Cybersecurity | On Feb. 1, Microsoft announced a new cybersecurity offering for federal government customers called the Modern Log Management Program. The program includes a suite of Microsoft’s visibility and remediation tools, which pull diagnostic data ... |
| 03.03.2022 | CardinalOps raises $17.5M for AI threat detection solution | Join today's leading executives online at the Data Summit on March 9th. Register here.
Today, AI threat detection provider CardinalOps announced it had raised $17.5 million as part of a Series A funding round led by Viola Ventures, to expan... |
| 03.03.2022 | CardinalOps raises $17.5M for AI threat detection solution | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Today, AI threat detection provider CardinalOps a... |
| 28.02.2022 | A Russia-linked hacking group broke into Facebook accounts and posted fake footage of Ukrainian soldiers surrendering, Meta says | Meta said it detected and took down two disinformation campaigns run by people in Russia and Ukraine.
One campaign broke into people's Facebook accounts to post fake news about Russia's invasion of Ukraine.
Advertisement
Meta said in a pres... |
| 16.02.2022 | Синтетические медиа: сможет ли нейросеть помочь в создании контента? | Синтетические медиа: сможет ли нейросеть помочь в создании контента? |
| 24.01.2022 | McAfee Enterprise, FireEye merge to become Trellix | Trellix CRO, Adam Philpott.
Symphony Technology Group (STG) has announced the launch of Trellix, a new business delivering extended detection and response (XDR) to organisations with a focus on accelerating technology innovation through mac... |
| 19.01.2022 | Symphony Technology Group Announces the Launch of Extended Detection and Response Provider, Trellix | Symphony Technology Group (STG) announced today the launch of Trellix, a new business delivering extended detection and response (XDR) to organizations with a focus on accelerating technology innovation through machine learning and automati... |
| 14.12.2021 | Ninety-seven percent of SA IT professionals say their environments don’t prioritise cyber security – McAfee Enterprise and FireEye research | Cyber security professional.
News highlights:
Just 3% of South African companies place enough emphasis on cyber readiness to prevent and respond to cyber security issues.
Nearly two-thirds of South African companies admit they should invest... |
| 24.11.2021 | Why Do Governments Reveal Cyber Intrusions? | On Sept. 26, Germany held federal elections to select the new members of the Bundestag, the country’s national parliament. Neither of the leading parties secured enough seats to govern alone, and it’s been estimated that it might be weeks b... |
| 12.11.2021 | China’s next generation of hackers won’t be criminals. That’s a problem. | Dakota Cary Contributor
Share on Twitter
Dakota Cary is a research analyst at Georgetown’s Center for Security and Emerging Technology (CSET), where he works on the CyberAI Project.
The TechCrunch Global Affairs Project examines the increas... |
| 05.11.2021 | Cybersecurity: Track data activity before “unusual” becomes dangerous | Image: Shutterstock/Funtap
There’s usual data activity, unusual data activity, and then there’s dangerous data activity. Christian Wimpelmann, identity and access manager (IAM) at Code42, expresses concern that not enough emphasis is placed... |
| 28.10.2021 | A Brief History of Online Influence Operations | The Wall Street Journal’s Facebook Files series resumed last week, revealing that the platform took action against an online campaign to set up a new right-wing “Patriot Party” after the Jan. 6 insurrection. Earlier this month news outlets ... |
| 26.10.2021 | China cyber attacks: the current threat landscape | Oct 26, 2021
Editor's note: This post, originally by Adam Hlavek on Jan. 10, 2021, includes updates dated March 1, April 6, 2021, May 28, 2021, and September 7, 2021
1. The latest China cyber attacks
2. Additional China cyber attack threat ... |
| 25.10.2021 | IronNet : Russian cyber attack campaigns and actors | Oct 25, 2021
Editor's Note: This post, originally published on December 21, 2020, by Adam Hlavek with Kimberly Ortiz, includes updates dated March 1, April 6, 2021, May 28, 2021, and September 7, 2021. Table of Contents
1. Most recent Russi... |
| 19.10.2021 | Testing Cybersecurity Effectiveness: The Importance Of Process Validation | VP and CISO for Mandiant, helping guide the company's product and solutions strategy and host of the Cyber Security Effectiveness Podcast. |
| 15.10.2021 | Расследование: как мы обнаружили новые следы группировки ChamelGang и помогли авиапромышленной компании пресечь ее атаку... | Если помните, недавно мы рассказывали о том, как специалисты нашего экспертного центра безопасности (PT Expert Security Center, PT ESC) обнаружили новую, ранее неизвестную APT-группировку, получившую название ChamelGang (ее профайл смотрите... |
| 05.10.2021 | Qualys : The Rise of Ransomware | With most employees still working from remote locations, ransomware attacks have increased steadily since the early months of the Covid-19 pandemic. According to the FBI's 2020 Internet Crime Report 2400+ ransomware-related incidents in 202... |
| 30.09.2021 | Лже-Microsoft, McAfee и Google: как мы обнаружили APT-группу, маскирующую сетевую инфраструктуру под легитимные сервисы | Источник: unsplash
На киберарене появился новый участник: специалисты PT Expert Security Center обнаружили ранее неизвестную преступную группировку. В России она пока нацелена на организации топливно-энергетического комплекса и авиационной ... |
| 30.09.2021 | АНБ дало советы по использованию и настройке VPN | Агентство национальной безопасности и Агентство по кибербезопасности и безопасности инфраструктуры США выпустили руководство с советами и практическими решениями для усиления безопасности при работе с виртуальными частными сетями.
Организац... |
| 22.09.2021 | Большая подборка полезных ресурсов от экспертов Positive Technologies: от лаб и подкастов до блогеров и сообществ | Хотите быть в курсе всего интересного, что происходит в практической информационной безопасности? Знать, за чьими твитами стоит следить, где можно подружиться с коллегами по цеху, что в первую очередь читать и смотреть, чтобы почерпнуть фун... |
| 20.09.2021 | Nation-state espionage group breaches Alaska Department of Health | Enlarge / If Alaska's native Ursus arctos population could be enlisted for cyber defense patrols, attackers might need to paws for reflection before committing a criminal breach.
Jared Lloyd via Getty Images reader comments 64 with 51 poste... |
| 20.09.2021 | Nation-state espionage group breaches Alaska Department of Health | Enlarge / If Alaska's native Ursus arctos population could be enlisted for cyber defense patrols, attackers might need paws for reflection before committing a criminal breach.
Jared Lloyd via Getty Images reader comments 54 with 46 posters ... |
| 17.09.2021 | Splunk : Hunting for Malicious PowerShell using Script Block Logging | Share:
By Splunk Threat Research Team September 17, 2021
The Splunk Threat Research Team recently evaluated ways to generate security content using native Windows event logging regarding PowerShell Script Block Logging to assist enterprise ... |
| 15.09.2021 | IronNet Cybersecurity : Analysis of the Iranian cyber attack landscape | Sep 14, 2021
Table of Contents
1. Most recent Iranian cyber attack news and attack campaigns
2. Iranian cyber attack history and strategy
3. Iranian cyber attack campaign updates by APT group
Iran often adopts an asymmetric warfare strategy... |
| 10.09.2021 | IronNet Cybersecurity : Russian cyber attack campaigns and actors | Sep 10, 2021
Editor's Note: This post, originally published on December 21, 2020, by Adam Hlavek with Kimberly Ortiz, includes updates dated March 1, April 6, 2021, May 28, 2021, and September 7, 2021. Table of Contents
1. Most recent Russi... |
| 31.08.2021 | ZeroFox announces partnership with Mandiant to disrupt malicious activity
Show your support for our mission by joining our Cube Club and Cube Event Community of experts. Join the community that inclu... | Cybersecurity firm ZeroFox Inc. today announced a global strategic partnership with Mandiant, a part of FireEye Inc., that will see ZeroFox offered as part of the Mandiant Advantage software-as-a-service platform.
The deal will see ZeroFox’... |
| 24.08.2021 | Trend Micro Incorporated : APT41 Resurfaces as Earth Baku With New Cyberespionage Campaign | We have uncovered a cyberespionage campaign being perpetrated by Earth Baku, an advanced persistent threat (APT) group with a known history of carrying out cyberattacks under the alias APT41. This is not the group's first foray into cyberes... |
| 19.08.2021 | 83 million devices using the Kalay protocol are at risk for remote takeover. Are yours? | Getty Images/iStockphoto
Kalay, a P2P IoT protocol developed by Taiwanese company ThroughTek, has a serious security problem: Remote attackers are able to exploit it in order to give them total, yet nearly invisible, control over devices us... |
| 17.08.2021 | Mandiant Appoints Vikram Ramesh As Chief Marketing Officer | Tech industry executive to drive marketing strategy and amplification around the Mandiant brand
Mandiant, a part of FireEye, Inc. announced that Vikram Ramesh, who has a track record of leading highly effective and measurable strategies as ... |
| 17.08.2021 | Искусство кибервойны: как китайские группы TaskMasters и TA428 атакуют Россию | Анастасия Тихонова
Руководитель группы исследования сложных угроз Threat Intelligence Group-IB
Дмитрий Купин
Ведущий специалист по анализу вредоносного кода Threat Intelligence Group-IB
В середине мая 2021 года эксперты из SOLAR JSOC вместе... |
| 16.08.2021 | FireEye : Advances XDR Platform to Arm Security Operations Teams | FireEye | MILPITAS, Calif. - FireEye, Inc. (NASDAQ: FEYE), the intelligence-led security company, today introduced FireEye XDR, a unified platform designed to help security operations teams strengthen threat detection, accelerate response capabilitie... |
| 11.08.2021 | Going for the Gold: Penetration Testing Tools Exploit Golden SAML | Going for the Gold: Penetration Testing Tools Exploit Golden SAML A contrived penetration testing scenario explores how attackers could exploit Active Directory Federated Services via Golden SAML and provides context for two Secureworks pen... |
| 10.08.2021 | Chinese group carried out widespread cyber espionage campaign in Israel – report | United States cybersecurity firm FireEye said a Chinese group has waged a widespread espionage campaign against Israeli entities.
The attacks targeted Israeli government institutions, IT providers and telecommunications firms in multiple, c... |
| 05.08.2021 | КиберВойны ближайшего будущего и почему снова актуален тренд на теорию заговора | Июль 2021 года. Пандемия COVID-19 до сих пор продолжается. По всему миру 196 млн зараженных, 4 млн летальных исходов, бушуют кризисы, обанкротившихся компаний становится все больше. Все, кто включает телевизор, заходит в Интернет или читает... |
| 02.08.2021 | Responsible Cyber Offense | News of the SolarWinds hack emerged with reports the incident had triggered an emergency Saturday meeting at the National Security Council. In the weeks that followed, the story dominated headlines. Whereas most offensive cyber operations r... |
| 22.07.2021 | The world's top ransomware gangs have created a cybercrime "cartel" | Several of the largest Russian ransomware cybercriminal gangs have partnered up and are sharing hacking techniques, purloined data-breach information, malware code and technology infrastructure.
The most active collaborators are four groups... |
| 21.07.2021 | Home and office routers come under attack by China state hackers, France warns | Enlarge
Getty Images reader comments 122 with 83 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
China state hackers are compromising large numbers of home and office routers for use in a vast and o... |
| 08.07.2021 | Morgan Stanley discloses data breach that resulted from Accellion FTA hacks | Enlarge
Getty Images reader comments 41 with 32 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
Morgan Stanley suffered a data breach that exposed sensitive customer data, and it became the latest k... |
| 06.07.2021 | Up to 1,500 businesses infected in one of the worst ransomware attacks ever | Enlarge
Suebsiri Srithanyarat / EyeEm / Getty Images reader comments 210 with 112 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
As many as 1,500 businesses around the world have been infected by h... |
| 29.06.2021 | Cobalt Strike: Favorite Tool from APT to Crimeware | Key Findings
Malicious use of Cobalt Strike in threat actor campaigns is increasing.
Threat actor use of Cobalt Strike increased 161 percent from 2019 to 2020 and remains a high-volume threat in 2021.
Cobalt Strike is currently used by more... |
| 17.06.2021 | Proofpoint : New TA402 Molerats Malware Targets Governments in the Middle East | Key Findings
TA402 leverages political and military themes, including the ongoing conflict in the Gaza Strip, to entice users to open attachments and click on malicious links.
TA402 activity is largely focused on entities operating in the M... |
| 03.06.2021 | Cybersecurity firm FireEye is selling its products business and name to private equity firm Symphony Technology Group for $1.2 billion in cash | U.S.-based cybersecurity firm FireEye announced Wednesday that it’s selling its products business, including the FireEye name, to a consortium led by private equity firm Symphony Technology Group for $1.2 billion in cash. The transaction is... |
| 03.06.2021 | FIREEYE, INC.
FireEye : Announces Sale of FireEye Products Business to Symphony Technology Group for $1.2 Billion | FireEye | - All cash transaction unlocks high-growth Mandiant Solutions business
- Continued partnership after closing supports customers with reseller relationship and shared product telemetry and frontline threat intelligence
- FireEye Board author... |
| 03.06.2021 | Salesforce wants to battle Microsoft. But will it get Slack right? | This is the web version of Term Sheet, a daily newsletter on the biggest deals and dealmakers. Sign up to get it delivered free to your inbox.
Late last year, Salesforce threw down a weighty gauntlet to Microsoft’s work-from-home Teams soft... |
| 02.06.2021 | FIREEYE, INC.
FireEye : Announces Sale of FireEye : Products Business to Symphony Technology Group for $1.2 Billion | FireEye, Inc. (NASDAQ: FEYE) today announced it has entered into a definitive agreement to sell the FireEye Products business, including the FireEye name, to a consortium led by Symphony Technology Group (STG) in an all-cash transaction for... |