Atlanta, GA, Oct. 30, 2024, CyberNewswire — The American Transaction Processors Coalition (ATPC) Cyber Council will convene “The Tie that Binds: A 21st Century Cybersecurity Dialogue,” on October 31, 2024, at the Bank of America Financial Center Tower’s Convention Hall in Atlanta.

This event will feature leading cyber experts from the financial services sector, Federal agencies, the White House, and Congress to focus on pressing cybersecurity issues and ways the financial services sector is addressing these issues. It will include discussions on evolving technologies that will influence the path forward, the role of AI, supply chain security needs, and more.

Richards

“Cybersecurity is the backbone of the payment processing industry,” said H. West Richards, ATPC executive director. “The work of the ATPC Cyber Council is a testament to our commitment to safeguarding our financial ecosystem and fostering a collaborative approach to tackling the cybersecurity challenges of tomorrow.”

Key speakers, highlights

•The Honorable Harry Coker, Jr., White House National Cyber Director, will deliver the luncheon keynote.

•The Honorable Rich McCormick (R-GA-06) will deliver a keynote address.

•Moira Bergin, Subcommittee on Cybersecurity Staff Director, House Committee on Homeland Security, will discuss legislative priorities and global cybersecurity risks.

•The Honorable Andre Dickens, Mayor of Atlanta, will provide a video address.

•Barry McCarthy, CEO of Deluxe and Chair of the ATPC Board of Directors, will also deliver a keynote.

•Bridgette Walsh, Executive Director of the Financial Services Sector Coordinating Council, and Josh Magri, Founder & CEO of Cyber Risk Institute, will participate in a fireside discussion on private sector best practices.

•A panel on AI in financial services will feature Clarissa Banks (Deluxe), David Excell (Featurespace), David King (Mastercard), and Donna Teevens (ACI Worldwide), moderated by Rick Van Luvender.

•A panel on cyber education will include Dr. Tony Coulson (CSUSB), Dr. Albena Asenova-Belal (Gwinnett Technical College), Dr. Humayun Zafar (Kennesaw State University), and Dr. Michael Nowatkowski (Augusta University).

•H. West Richards, ATPC Executive Director, will open the event with a welcome address.

•Rick Van Luvender, ATPC Cyber Council Chair & SVP, Head of Cybersecurity Client Trust & International Cybersecurity Service at Fiserv, will deliver the opening remarks.

•Norma Krayem, ATPC Cyber Council Director & Vice President, Chair of the Cybersecurity, Privacy & Digital Innovation Practice Group at Van Scoyoc Associates, will provide insights on future cybersecurity trends.

The forum will conclude with a fireside chat focused on “A Look to the Future: 2025: Top Cybersecurity and Critical Technology Priorities for the ATPC Cyber Council,” featuring Rick Van Luvender from Fiserv and Norma Krayem, the ATPC Cyber Council director, focusing on future cybersecurity and critical technology priorities.

Conference details are available at https://atpcoalition.com/atpc-cyber-forum/.

ATPC is a leading voice for America’s payments processors, consisting of the world’s largest, global payment processors, banks, credit card companies and financial services companies. ATPC member companies are uniquely positioned to ensure global payments move seamlessly across the world, while empowering broader and more diverse participation within the financial services system.

In the race for a better tomorrow, technology solutions can advance faster than companies can keep up with cybersecurity risks. As a result, the ATPC is one of the few coalitions that created a standalone Cybersecurity Council to prioritize these key cybersecurity issues across its member companies.

The ATPC Cyber Council is a unique group made up of only CISOs, CSOs, CIOs and CTOs who are on the front lines every day dealing with the operational impacts of cybersecurity. These U.S. based companies serve hundreds of millions of customer businesses across the globe daily and process hundreds of billions of transactions per year.

About the ATPC: The ATPC is a leading voice for America’s payments processors, driving awareness of the industry and its value to consumers, businesses, and the economy with legislators and regulators at federal, state, and international levels. The ATPC is rooted in Georgia’s Transaction Alley where electronic payments and the fintech industry began. Yet, our members enable payments in states across the nation and in every corner of the globe. The ATPC has a rich history of economic development, thought leadership, and engagement on legislative and regulatory topics like cybersecurity, privacy, financial inclusion, fraud, as well as emerging themes like open banking, AI, and stable coins. 

About the ATPC Cyber Council: The American Transaction Processors Coalition (ATPC) established a dedicated Cyber Council to galvanize the efforts of the ATPC member companies in addressing cybersecurity risks. The Cyber Council’s mission is to identify best practices and areas of shared risk to help ATPC members address the evolving cyber threat across America’s payments processing system to strengthen industry’s ability to identify, protect, detect, respond to and recover from cyberattacks. 

 Media contact: Alison Watson, Golin, awatson@golin.com

The post News alert: Cybersecurity, AI priorities for 2025 highlighted at ATPC Cyber Forum in Atlanta first appeared on The Last Watchdog.

Cary, NC, Oct. 28, 2024, CyberNewswire — As the year-end approaches, it’s common for enterprises to discover they still have funds that must be utilized. Often, these L&D dollars are “use or lose,” meaning they will be returned to the general fund if not invested.

Recognizing this, INE Security is launching an initiative to guide organizations in investing in technical training before the year end. This approach not only ensures wise expenditure of remaining budgets but also significantly strengthens organizational security postures.

Addressing Training Budgets:

•Year-End Budget Scenario: It’s common for organizations to approach year-end with an unused budget designated for training. If not spent, these funds often return to general accounts or are lost altogether, missing an opportunity for strategic investment.

•Strategic Spending: INE Security encourages using these funds to invest in team cybersecurity training, turning what could be wasted resources into a pivotal investment in security and professional development.

•Advantages of Utilizing Surplus Funds: Proactively using surplus training budgets can help organizations make strategic decisions that align with long-term goals, improving security protocols and fostering a knowledgeable workforce.

How Organizations Can Utilize Available Training Budgets:

Skill Enhancement: Upgrade the team’s skills to defend against the latest networking, cloud, and cybersecurity threats.

Employee Retention: Invest in employees’ growth to boost morale and retention – especially in a tight job market where your best employees may be lured to other companies.

Future-Proofing: Prepare teams for future challenges with forward-looking training programs.

Compliance and Standards: Ensure compliance with industry standards and regulations through accredited courses and certifications – bolstering your team for contract awards and impending compliance requirements (CMMC).

Warn

“In a time when digital threats are increasing in both complexity and frequency, proactive Networking, Cloud, and Cybersecurity training is more crucial than ever,” said Dara Warn, CEO of INE Security. “We recognize that many organizations end the year with a surplus in their training budgets. This is an excellent opportunity to invest in vital training, ensuring teams are not only prepared but are ahead of the curve.”

Organizations can benefit by engaging in INE Security’s expert-led courses and hands-on labs, which are designed to provide real-world experience and in-depth knowledge across Networking, Cloud, and Cybersecurity. In recognition of the often-underused training budgets available at year’s end, INE Security is offering significant discounts for team training on two-year deals. This initiative not only helps organizations optimize their unspent training funds but also boosts their long-term security strategies.

To learn more about INE’s comprehensive Networking, Cloud, and Cybersecurity training programs, users can visit www.ine.com or contact INE Security’s corporate training advisors directly.

About INE: INE Security is the premier provider of online technical training for the IT/IS industry. Harnessing a powerful hands-on lab platform, cutting-edge technology, a global video distribution network, and world-class instructors, INE Security is the top training choice for Fortune 500 companies worldwide and for IT/IS professionals looking to advance their careers. INE’s suite of learning paths offers an incomparable depth of expertise across cybersecurity, cloud, networking, and data science. INE Security is committed to delivering advanced technical training while also lowering the barriers worldwide for those looking to enter and excel in a cybersecurity career. 

Media contact: Kathryn Brown, Director of Global Strategic Communications and Events, INE Security, kbrown@ine.com

The post News alert: INE shares guidance to help companies invest in year-end cybersecurity, networking training first appeared on The Last Watchdog.

Cary, NC, Oct. 22, 2024, CyberNewswire — INE Security offers essential advice to protect digital assets and enhance security.

As small businesses increasingly depend on digital technologies to operate and grow, the risks associated with cyber threats also escalate. INE Security, a leading provider of cybersecurity training and certifications, today shared its cybersecurity training for cyber hygiene practices for small businesses, underscoring the critical role of continuous education in safeguarding digital assets.

Warn

“Small businesses face a unique set of cybersecurity challenges and threats and must be especially proactive with cybersecurity training,” said Dara Warn, CEO of INE Security. “At INE Security, we work directly with small business leaders to ensure they are able to assess their team’s skills and access the cybersecurity training that will be most effective to their unique needs.”

Tip 1: Educating and Training the Workforce Regularly

Human error remains one of the leading causes of data breaches. According to the Verizon 2024 Data Breach Investigations Report, 68% of cybersecurity breaches are caused by human error. INE Security emphasizes the importance of regular training forall employees. Cybersecurity training for small businesses is critical, and SMBs should invest in training programs to help employees recognize threats such as phishing attacks, ransomware, and other malicious activities.

Tip 2: Implementing Strong Password Policies

Weak passwords can be easily compromised, giving attackers access to sensitive systems and data. LastPass reports that 80% of all hacking-related breaches leveraged either stolen and/or weak passwords. INE Security recommends implementing strong password policies that require the use of complex passwords and regular updates.

Tip 3: Securing and Monitoring the Network

Small businesses often overlook network security, leaving them vulnerable to attacks. INE Security advises businesses to secure their network by using firewalls, encrypting data, and regularly updating security software. Network monitoring tools can also detect unusual activities and prevent potential breaches. The cost of ignoring such measures can be substantial, as noted in IBM’s 2023 Cost of a Data Breach Report, which found the average impact of a data breach on small businesses can exceed $3.31 million.

Tip 4: Regularly Updating and Patching Systems

Keeping software and systems up to date is crucial in protecting against vulnerabilities. Many cyber attacks exploit vulnerabilities in outdated software. Nearly 60% of organizations hit by a data breach blame a known vulnerability for which they had not yet patched, according to reports published by Dark Reading. INE Security recommends establishing a routine for updating and patching software, which can significantly reduce the risk of a breach.

Tip 5: Backing Up Data Regularly

Data loss can be devastating for small businesses. Regular backups ensure that businesses can recover quickly from ransomware attacks or other data loss incidents. INE Security suggests using automated backup solutions that regularly save copies of all critical data in a secure, off-site location, in addition to following the 3-2-1 rule recommended by the Department of Homeland Security’s Computer Emergency Readiness Team. The 3-2-1 rule recommends:

3 – Keeping 3 copies of any important file: 1 primary and 2 backups.

2 – Keeping the files on 2 different media types to protect against different types of hazards.

1 – Storing 1 copy offsite (e.g., outside the house or business facility)

For more information about cybersecurity training programs that can help protect small business, users can visit security.ine.com.

About INE Security INE Security is the premier provider of online technical training for the IT/IS industry. Harnessing the world’s most powerful hands-on lab platform, cutting-edge technology, global video distribution network, and world-class instructors, INE Security is the top training choice for Fortune 500 companies worldwide and for IT professionals looking to advance their careers. INE’s suite of learning paths offers an incomparable depth of expertise across cybersecurity, cloud, networking, and data science. INE Security is committed to delivering advanced technical training while also lowering the barriers worldwide for those looking to enter and excel in a cybersecurity career. 

Media contact: Kathryn Brown, Director of Global Strategic Communications and Events, INE Security, kbrown@ine.com

The post News alert: INE Security shares cyber hygiene guidance for small- and medium-sized businesses first appeared on The Last Watchdog.

Austin, TX, Oct. 10th, 2024, CyberNewswire — SpyCloud, the leader in Identity Threat Protection, announced that its SaaS Investigations solution has been enhanced with identity analytics that illuminate the scope of digital identities and accelerate successful outcomes of complex investigations from days or hours to minutes.

SpyCloud Investigations is a powerful cybercrime and identity threat investigation solution used by analysts and investigators to discover and act on threats by navigating the world’s largest repository of recaptured breach, malware, and phishing data. It powers rapid analysis of identity exposures across organizations, VIPs and supply chains, pattern of life analysis, threat actor attribution, insider risk analysis, financial crimes research, and more.

SpyCloud Investigations now includes IDLink, the company’s advanced analytics technology that automatically delivers expanded digital identity results from a simple search query. Where a traditional threat intelligence or investigations tool may provide a small number of records directly correlated to the search input, IDLink expands the pool of results to include identity data correlated across shared usernames, emails, passwords, and PII – with flexible options around pivoting depth, confidence levels, and visualization.

Based on more than a decade’s worth of techniques and expertise developed by renowned investigators at SpyCloud, including former intelligence agency personnel, IDLink uniquely provides a more comprehensive picture of identity compromise to give analysts more avenues for investigation while reducing errors and missed data points. Organizations with fewer in-house CTI, security operations, or fraud/e-crime prevention resources now have an easy-to-use solution to expand their investigative capabilities without adding additional expertise or headcount.

Lancaster

“SpyCloud Investigations is the ultimate force multiplier for security teams,” said Jason Lancaster, SpyCloud’s senior vice president of investigations. “SpyCloud’s team of investigators have decades of experience investigating cybercrimes day and night, across all manner of use cases, with public and private sector partners. We’ve spent the last year infusing this knowledge into our solution so analysts at all skill levels can reap the benefits.”

With IDLink advanced analytics now foundational to its industry-leading solution, SpyCloud Investigations offers users the ability to visualize holistic identities of exposed employees, consumers, vendors, and cybercriminal actors themselves to more quickly and comprehensively identify and act on risks – helping them achieve:

–Up-leveled analyst output: Investigative workflows automate the process of identifying hidden identity exposures, up-leveling analysts and investigators of all skill levels, increasing team productivity, discovery, and resolution.

–Hidden connections: IDLink automatically connects the dots and rapidly pieces together a holistic view of a digital identity, in minutes instead of hours of advanced analysis previously.

–Attribution: Automated analytics deliver linked exposed identity assets and records, reducing dead ends in investigations and delivering critical details about criminal actors and threats.

This announcement comes at a time when adversaries are increasingly using stolen identity data to bypass security measures and exploit exposed access. This is evidenced by large-scale infostealer malware campaigns and headline-grabbing breaches, such as the National Public Data breach, which leaked 2.7 billion identity records – including hundreds of millions of Americans’ Social Security numbers.

“There is a vast amount of personal information in criminals’ hands,” said Jason. “SpyCloud Investigations gets that same data into the right hands, faster, to protect businesses and their users. By illuminating connections, opening up new threads to investigate, and offering unlimited queries to SpyCloud’s enriched database of breached, phished, and malware-exfiltrated data, analysts can visualize threats and act decisively, enhancing organizational resilience against cybercrime and identity threats.”

For more information about SpyCloud Investigations or to schedule a complimentary demo to explore your data, users can contact us here.

About SpyCloud — SpyCloud transforms recaptured darknet data to disrupt cybercrime. Its automated identity threat protection solutions leverage advanced analytics to proactively prevent ransomware and account takeover, safeguard employee and consumer accounts, and accelerate cybercrime investigations. SpyCloud’s data from breaches, malware-infected devices, and successful phishes also powers many popular dark web monitoring and identity theft protection offerings. Customers include more than half of the Fortune 10, along with hundreds of global enterprises, mid-sized companies, and government agencies worldwide. Headquartered in Austin, TX, SpyCloud is home to more than 200 cybersecurity experts whose mission is to protect businesses and consumers from the stolen identity data criminals are using to target them now. To learn more and see insights on your company’s exposed data, users can visit spycloud.com.

Media contact: Emily Brown, REQ on behalf of SpyCloud, ebrown@req.co

The post News alert: SpyCloud accelerates supply chain risk analysis with new ‘IDLink’ correlation capability first appeared on The Last Watchdog.

Torrance, Calif., Oct. 7, 2024, CyberNewswire — Criminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed by AI SPERA, has partnered with Hybrid Analysis, a platform that provides advanced malware analysis and threat intelligence, to enhance threat research.

This collaboration integrates Criminal IP’s advanced domain scanning capabilities into the Hybrid Analysis platform, providing security professionals with deeper insights and more effective threat mitigation strategies.

Real time analysis

Hybrid Analysis employs dynamic and static techniques for thorough malware analysis. Real-time execution environments and memory dumps generate annotated disassembly listings and critical Indicators of Compromise (IOCs).

Criminal IP specializes in real-time domain scanning, scrutinizing domains for phishing, malware, and illicit activities. Integration enriches threat profiles, improving threat detection accuracy.

Key benefits

•Enhanced threat profiling: Security professionals can gain deeper insights into the origins and behaviors of threats identified through Hybrid Analysis, enriched with Criminal IP’s data.

•Real-time domain analysis: Integration with Criminal IP enables users to conduct real-time scans on domains of interest, which is crucial for accurately identifying emerging threats promptly.

•Comprehensive security insights: Users gain access to detailed domain attributes such as phishing records, abuse incidents, and detection of embedded malicious code, enhancing their ability to analyze for signs of Domain Generation Algorithms (DGA) and phishing probabilities.

•Interactive score card: Users can quickly assess domain status, accessing additional details directly from Criminal IP database to make informed decisions based on the latest threat intelligence.

Advanced detection

In addition to this comprehensive maliciousness result, uses seeking information about each component and false positives can visit Criminal IP.

The URL scan feature allows users to extract a wealth of data, including network logs, associated IP addresses, malicious links, and website vulnerabilities.

Users of Criminal IP Domain Search can access valuable insights such as technology usage specifics, abuse records, and identified CVE vulnerabilities, all conveniently consolidated on a single page.

This robust search engine offers three customizable subscription plans—Lite, Medium, and Pro—including a Free membership option.

To determine the most suitable plan based on user’s volume of IP Lookup and URL Scan/Lookup requirements, users can explore the Free membership, monitor their credit usage through a user-friendly dashboard, and take advantage of key features for gaining valuable insights.

About AI SPERA: AI SPERA, a leader in Cyber Threat Intelligence (CTI) solutions, significantly expanded its reach by launching its flagship solution, Criminal IP, in 2023.

Since then, the company has formed technical and business collaborations with over 40 renowned global security firms, including Hybrid Analysis, VirusTotal, Cisco, Tenable, Sumo Logic, and Quad9.

Besides the CTI search engine, the company offers Criminal IP ASM, a SaaS-based Attack Surface Management Solution on AWS Marketplace and Azure Marketplace, and Criminal IP FDS, an AI-based Anomaly Detection Solution for credential stuffing prevention and fraud detection.

Available in five languages (English, French, Arabic, Korean, and Japanese), the search engine provides a powerful service for users worldwide.

 Media contact: Michael Sena, AI SPERA, support@aispera.com

The post News alert: Hybrid Analysis adds Criminal IP’s real-time domain scans, boosts malware detection first appeared on The Last Watchdog.

San Francisco, Calif., Oct. 3, 2024, CyberNewswire — Doppler, the leading platform in secrets management, today announces the launch of Change Requests, a new feature providing engineering teams with a secure, auditable approval process for managing and controlling secret changes across environments.

Designed to enhance security, compliance, and team collaboration, Change Requests gives organizations the tools to mitigate the potential risks from misconfigurations or unauthorized changes and maintain a comprehensive audit trail of all secret modifications. This launch comes at a time when organizations are facing increased security and compliance demands, particularly in managing sensitive information.

As security breaches and insider threats continue to rise, managing secrets has become a growing challenge for teams of all sizes; protecting sensitive information at every stage of the software development lifecycle is critical.

According to a recent study by Cybersecurity Ventures, cybercrime damages are expected to cost the world $9.5 trillion in 2024 alone, and compromised secrets and misconfigurations remain significant factors in these attacks. In 2023, GitGuardian reported that there were 12.8 million incidents of exposed secrets on Github which is an increase of 28% from 2022, highlighting the need for tighter controls over sensitive information.

Doppler’s Change Requests is designed to address these risks by introducing a formalized, auditable approval process for secrets management.

This feature offers teams a centralized and controlled way to manage changes to sensitive information while maintaining full visibility into who made updates and when.

Addressing security, compliance

•Reducing misconfiguration: According to the most recent Verizon Data Breach Investigation Report, breaches as a result of errors grew by 28%. By treating secret changes like code, Doppler seeks to help companies decrease this number and reduce the chances of misconfigurations reaching production. With Change Requests, organizations can require peer reviews and approvals for every configuration change to ensure all updates undergo proper scrutiny before being deployed.

•The growing compliance burden: Cybersecurity standards are increasingly holding companies accountable for how they handle sensitive data. Organizations need clear audit trails and compliance-friendly processes. Paired with detailed activity logging, Change Requests further eases the burden teams face by keeping a complete, auditable trail of every request, review, and change, providing a fully traceable history.

•Enforce security with controlled access: As teams grow, so does the complexity of managing secrets. Organizations can safeguard sensitive secrets with custom roles and user groups by enforcing a structured approval process, ensuring only authorized personnel can make critical updates. This helps prevent unauthorized changes and boosts their overall security posture while keeping teams nimble.

Building trust through security

Vallelunga

“It’s incredibly exciting to ship our most demanded feature by both developers and enterprises! Just as pull requests have increased the level of trust with production code, Doppler will fill that long awaited gap with secrets,” said Brian Vallelunga, CEO of Doppler. “I’m confident that Doppler’s Change Requests is going to establish a new paradigm for managing secrets securely at enterprise scale—undergoing approval, maintaining a rich audit trail for security and compliance, and integrating natively with production infrastructure for uninterrupted, no-downtime rollouts.”

 Availability

The Change Requests feature is available now for all users on Doppler’s Enterprise plan. To learn more about implementing Change Requests and how it can improve the organization’s security and compliance efforts, users can visit Doppler’s documentation.

About Doppler: Doppler is the leading platform for managing secrets such as environment variables, API keys, and tokens in a centralized, secure, and scalable way. Trusted by thousands of security-conscious teams around the world, Doppler provides developers with the tools they need to keep secrets in sync across every app, service, and infrastructure. Built with security in mind, Doppler offers robust integrations, comprehensive logging, and enterprise-grade encryption to ensure sensitive data remains protected throughout its lifecycle.

Media contact: Doppler Press, press@doppler.com

The post News alert: Doppler fortifies ‘secrets management’ with Change Requests auditable approval feature first appeared on The Last Watchdog.

Singapore, Oct. 3, 2024, CyberNewswire — At DEF CON 32, the SquareX research team delivered a hard-hitting presentation titled Sneaky Extensions: The MV3 Escape Artists where they shared their findings on how malicious browser extensions are bypassing Google’s latest standard for building chrome extensions: Manifest V3 (MV3)’s security features, putting millions of users and businesses at risk.

SquareX’s research team publicly demonstrated rogue extensions built on MV3. The key findings include:

•Extensions can steal live video streams, such as those from Google Meet and Zoom Web, without requiring special permissions.

•The rogue extensions can act on a user’s behalf to add collaborators to private GitHub repositories.

•The extensions are capable of hooking into login events to redirect users to a page disguised as a password manager login.

•Extensions built on MV3 can steal site cookies, browsing history, bookmarks, and download history with ease, like their MV2 counterparts.

•The rogue extensions can add pop-ups to the active webpage, such as fake software update prompts, tricking users into downloading malware.

Browser extensions have long been a target for malicious actors — a Stanford University report estimates that 280 million malicious Chrome extensions were installed in recent years. Google has struggled to address this issue, often relying on independent researchers to identify malicious extensions.

In some cases, Google has had to manually remove them, such as the 32 extensions taken down in June last year. By the time they were removed, these extensions had already been installed 75 million times.

Most of these issues arose because the Chrome extension standard, Manifest Version 2 (MV2), was riddled with loopholes that granted extensions excessive permissions, and allowed scripts to be injected on the fly, often without users’ knowledge. This allowed malicious actors to easily exploit these vulnerabilities to steal data, inject malware, and access sensitive information. MV3 was introduced to address these problems by tightening security, limiting permissions, and requiring extensions to declare their scripts beforehand.

However, SquareX’s research shows that MV3 falls short in many critical areas, demonstrating how attackers are still able to exploit minimal permissions to carry out malicious activity. Both individual users and enterprises are exposed, even under the newer MV3 framework.

Today’s security solutions, such as endpoint security, SASE/SSE, and Secure Web Gateways (SWG), lack visibility into installed browser extensions. There is currently no mature tool or platform capable of dynamically instrumenting these extensions, leaving enterprises without the ability to accurately assess whether an extension is safe or malicious.

SquareX is committed to the highest level of cybersecurity protection for enterprises and has built key innovative features to solve this problem, which include;

•Fine grained policies to decide which extensions to allow / block and parameters include extension permissions, creation date, last update, reviews, ratings, user count, author attributes etc

•SquareX blocks network requests sent by extensions at run time – based on policies, heuristics and machine learning insights

•SquareX is also experimenting with dynamic analysis of Chrome Extensions using a modified Chromium browser in its cloud server

These are part of SquareX’s Browser Detection and Response solution which is being deployed at medium-large enterprises and is effectively blocking these attacks.

Ramachandran

Vivek Ramachandran, Founder & CEO of SquareX, warned about the mounting risks: “Browser extensions are a blind spot for EDR/XDR and SWGs have no way to infer their presence. This has made browser extensions a very effective and potent technique to silently be installed and monitor enterprise users, and attackers are leveraging them to monitor communication over web calls, act on the victim’s behalf to give permissions to external parties, steal cookies and other site data and so on,” he said.

“Our research proves that without dynamic analysis and the ability for enterprises to apply stringent policies, it will not be possible to identify and block these attacks. Google MV3, though well intended, is still far away from enforcing security at both a design and implementation phase,” Ramachandran added.

About SquareX: SquareX helps organizations detect, mitigate and threat-hunt client-side web attacks happening against their users in real time.

SquareX’s industry-first Browser Detection and Response (BDR) solution, takes an attack-focused approach to browser security, ensuring enterprise users are protected against advanced threats like malicious QR Codes, Browser-in-the-Browser phishing, macro-based malware, malicious extensions and other web attacks encompassing malicious files, websites, scripts, and compromised networks.

With SquareX, enterprises can also provide contractors and remote workers with secure access to internal applications, enterprise SaaS, and convert the browsers on BYOD / unmanaged devices into trusted browsing sessions.

Media contact: Junice Liew, Head of PR, SquareX, junice@sqrx.com

The post News alert: SquareX shows how Google’s MV3 standard falls short, putting millions at risk first appeared on The Last Watchdog.

Torrance, Calif., Oct. 3, 2024, CyberNewswire — An exclusive live webinar will take place on October 4th at noon Eastern Time (ET), demonstrating how Criminal IP’s Attack Surface Management (ASM) can help organizations proactively detect and mitigate cyber threats.

The webinar will feature a Criminal IP ASM Live Demo, providing a comprehensive view of attack surface visibility. As cyber threats continue to evolve, businesses must strengthen their defenses, and this session will outline essential steps for achieving that goal.

Users can register now for the free webinar at 12PM ET on October 10 ?

Key takeaways

•Criminal IP ASM live demo. Seeing ASM in action as it uncovers hidden threats and helps secure user’s organization attack surface.

Comprehensive attack surface visibility. Discovering how to gain real-time insights into a user’s organization’s digital ecosystem, identifying vulnerabilities before they can be exploited.

•Proactive threat detection and mitigation. Learning how to detect risks early and implement mitigation strategies to minimize exposure.

•Strengthening cyber defenses with ASM. Exploring how ASM can be integrated into cybersecurity frameworks to enhance protection and provide continuous defense against threats.

This webinar is designed for IT professionals, security managers, and decision-makers looking to advance their cybersecurity strategies and stay ahead in today’s rapidly changing threat landscape.

Users can register now to gain valuable insights on safeguarding their organization’s attack surface and taking proactive steps toward a more secure future.

 Media contact: Michael Sena, AI SPERA, support@aispera.com

The post News alert: Upcoming webinar highlights threat mitigation, fortifying ‘ASM’ with Criminal IP first appeared on The Last Watchdog.

Silver Spring, MD, Oct. 2, 2024, CyberNewswire — Aembit, the non-human IAM company, today announced the appointment of Mario Duarte as chief information security officer (CISO). Duarte, formerly head of security at Snowflake, joins Aembit with a deep commitment to address pressing gaps in non-human identity security.

Duarte’s journey in cybersecurity began with a passion for penetration testing, sparked by the 1980s cult classic film WarGames. He started his career in red teaming, later expanding his expertise into both technical and leadership roles on the defensive side.

Throughout his career, he has focused on protecting mission-critical systems, solving complex security problems, and developing and overseeing high-performing teams.

His experience spans multiple industries, including finance, health care, retail, and technology. Most notably, Duarte spent nearly a decade at Snowflake, where he played a key role in shaping and leading the data cloud company’s security program, rising to vice president of security (aka CISO). It was during this time that he first encountered Aembit and its innovative and award-winning approach to securing non-human identities.

“I fell in love with security because of the thrill of finding weaknesses and fixing them,” Duarte said. “I’ve always had the mindset of an attacker, but over the years, I’ve focused on defending organizations – understanding where the real threats are coming from and solving those problems at scale. Throughout my career, I’ve witnessed how non-human identities like workloads and service accounts are being exploited, and knew this was the next big frontier in security.”

Before his time at Snowflake, Duarte held senior security roles at multiple organizations, including GoGrid, Moodys KMV, and Ross Stores. His ability to adapt and thrive in diverse sectors helped shape his understanding of security from multiple threat angles and perspectives, including compliance with FedRAMP, HIPAA/HITECH, and PCI standards.

Duarte was drawn to Aembit not only because of its groundbreaking technology but also by the culture and mission of the company.

“Aembit is solving a problem that’s been neglected for years – securing the non-human identities that drive IT infrastructure,” he said. “It’s replacing outdated methods like static credentials and manual processes with a more dynamic and secure approach that my peers and I have been seeking for a long time. The Aembit team recognizes the complexity of this problem and is relentless in creating a practical and scalable solution for it.”

As the need for identity-driven, secretless, centrally enforced, and auditable connections across distributed applications, SaaS services, and the rise of AI workloads, the Aembit Workload IAM Platform – honored as runner-up in the 2024 RSA Innovation Sandbox competition – responds by enforcing secure access between non-human workloads and the sensitive resources and infrastructure that businesses run on, providing just-in-time, secretless access based on the workload’s identity and posture.

“Mario brings an unmatched level of experience and passion to our team,” Aembit Co-Founder and CEO David Goldschlag said. “He’s been in the trenches, defending some of the most sophisticated infrastructures, and his leadership will help guide Aembit as we continue to solve the toughest identity security challenges.”

In his new role, Duarte will focus on advancing Aembit’s efforts to meet the needs of the security community as organizations increasingly shift to cloud-native, distributed, and automated environments. His deep connection to his fellow CISOs and security professionals, along with his commitment to providing effective, scalable, and practical solutions, will help guide Aembit’s continued growth in this fast-growing space.

“Security is my tribe,” he said. “The stakes are too high here, and I wouldn’t put my name behind anything I didn’t fully believe in.”

About Aembit: Aembit is the leading provider of workload identity and access management solutions, designed to secure non-human identities like applications, AI agents, and service accounts across on-premises, SaaS, cloud, and partner environments. Aembit’s no-code platform enables organizations to enforce access policies in real-time, ensuring the security and integrity of critical infrastructure. Users can follow them on LinkedIn.

Media contact: Apurva Davé, CMO, Aembit, info@aembit.io

The post News alert: Aembit appoints former Snowflake security director Mario Duarte as its new CISO first appeared on The Last Watchdog.

Pittsburgh, PA, Oct. 1, 2024 — ForAllSecure, the world’s most advanced application security testing company, today announced it is changing its corporate name to Mayhem Security (“Mayhem”), signaling a new era of growth and opportunity aligned with its award-winning Mayhem Application Security platform.

Founded by a team of researchers from Carnegie Mellon, the company’s focus has evolved from research, development, and education to a product company centered around its Mayhem platform that quickly went from a Defense Advanced Research Project Agency (DARPA) Cyber Grand Challenge prototype to an in-demand commercialized AI-driven application security platform.

Today, the Mayhem platform has been integrated into thousands of open-source projects, building a library of behavioral tests, identifying new zero-days, and helping defend against software supply chain threats.

The name change follows record product achievements, with platform ARR rising 275% year over year and 78% of customers expanding their Mayhem footprint at or before their first subscription renewal.

Brumley

“ForAllSecure has a long, successful history, from winning the DARPA Grand Challenge to dedicating ourselves to research and innovation in the cybersecurity industry through Mayhem Heroes, hackathons, and consulting,” said David Brumley, CEO of Mayhem. “Our new name and focus mark an important evolution for us as the Mayhem brand becomes synonymous with the platform that is transforming API security testing and has powered our growth.

“In fact, for several years, it was the majority of our revenue. Our new positioning is a natural next step as we continue the hard work of our dedicated researchers and hackers who will continue to push out innovative research and prototype new ways to defend software.”

The past year has been a banner year, with the company achieving key innovation milestones. Most notably, Mayhem released Mayhem Dynamic software bill of materials (SBOM), which brings Mayhem’s runtime intelligence to the world of software composition analysis (SCA) and SBOM by looking at an application’s actual behavior to find only real, exploitable vulnerabilities, eliminating triage and investigations, and reducing false positives to increase developer velocity and minimize application risks.

Mayhem re-architected its symbolic executor to test and triage 60% faster, released support for Windows-based applications, and launched a beta of automated harnessing for embedded systems.

Under the name Mayhem Security, the company will continue to collaborate with the government and the industry to advance cybersecurity and revolutionize how organizations approach cybersecurity by automating the process of finding and fixing software vulnerabilities.

For more information, visit https://www.mayhem.security/.

About Mayhem Security: Mayhem Security, formerly ForAllSecure, is a hacker organization focused on advancing cybersecurity through research, education, and product development. Founded in 2012 by CMU researchers, Mayhem Security has over a decade of experience building and participating in CTFs and partnering with K-12 and university departments to develop cybersecurity education programs. In 2016, the company won DARPA’s cyber grand challenge focused on autonomous security. Mayhem, the company’s first commercial product, launched in 2019. Based in Pittsburgh, PA, the company is backed by NEA and KDT and has offices worldwide.

Media Contact: Danielle Ostrovsky, Hi-Touch PR, 410-302-9459, ostrovsky@hi-touchpr.com 

The post News alert: Introducing Mayhem Security — ForAllSecure unveils name change, fresh focus first appeared on The Last Watchdog.