Symantec
Virtual machines hide ransomware until the encryption process is done
The use of virtual machines (VMs) to run the malicious payload is getting more popular with ransomware attackers, Symantec’s Threat Hunter Team claims. Ransomware deployed in …
Pindrop appoints Collin Davis as CTO
Pindrop announces the appointment of Collin Davis as its first Chief Technology Officer to continue evolving Pindrop’s contact center solutions, including fraud, IVR, and …
Bishop Fox appoints Patty Wright as SVP and GM of consulting
Bishop Fox announced the appointment of accomplished industry executive, Patty Wright, as senior vice president and general manager of consulting. Wright brings a wealth of …
Virsec expands executive team to further drive business acceleration
Virsec reported significant momentum in the first half of 2021 with solid revenue growth, strategic customer validation and testing, and prominent industry acceptance of its …
Socure appoints Gary Sevounts as CMO
Socure announced the appointment of Gary Sevounts as its chief marketing officer (CMO). Sevounts, an award-winning marketer with more than 20 years of industry experience, …
Aruba announces set of cross-portfolio edge-to-cloud security integrations for Aruba ESP
Aruba, a Hewlett Packard Enterprise company announced an expansive set of cross-portfolio edge-to-cloud security integrations for Aruba ESP (Edge Services Platform). The new …
Cofense acquires Cyberfish to eliminate the need for legacy email security solutions
Cofense announced the acquisition of Cyberfish, provider of next-generation phishing protection powered by Computer Vision and advanced Machine Learning (ML) technology. By …
Morphisec raises $31M to enable business to automatically prevent dangerous cyberattacks
Morphisec announced that it raised $31 million in funding led by JVP. Other existing investors, including Orange and Deutsche Telekom Capital Partners, also participated in …
Malwarebytes was breached by the SolarWinds attackers
A fourth malware strain wielded by the SolarWinds attackers has been detailed by Symantec researchers, followed by the disclosure of the attackers’ ingenous lateral …
25 vulnerabilities exploited by Chinese state-sponsored hackers
The US Cybersecurity and Infrastructure Security Agency (CISA) has released a list of 25 vulnerabilities Chinese state-sponsored hackers have been recently scanning for or …
Microsoft and partners cut off key Trickbot botnet infrastructure
Two weeks after someone (allegedly the US Cyber Command) temporarily interrupted the operation of the infamous Trickbot botnet, a coalition of tech companies headed by …
2020 cybersecurity risks: Insecure security tools, supply chains, abandonware
Considerable time and money are invested into looking for dangerous vulnerabilities in the most commonly used elements of IT infrastructure. Popular operating systems, …