{"id":1264,"date":"2019-08-21T00:00:00","date_gmt":"2019-08-21T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2019\/08\/21\/incident-response-newsalert-2019-08-18\/"},"modified":"2021-12-30T11:39:03","modified_gmt":"2021-12-30T11:39:03","slug":"incident-response-newsalert-2019-08-18","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2019\/08\/21\/incident-response-newsalert-2019-08-18\/","title":{"rendered":"Incident Response Newsalert &#8211; 2019-08-18"},"content":{"rendered":"<h2 style=\"display: block;margin: 0;padding: 0;font-family: Helvetica;font-size: 20px;font-style: normal;font-weight: bold;line-height: 125%;letter-spacing: -.75px;text-align: left;color: #202020 !important;\"><a id=\"a_toc\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">Table of Contents<\/a><\/h2>\n<ul>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Security warning for software developers: You are now prime targets for phishing attacks&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">[Infographic] Nations and Hackers Unleash Destructive Malware!&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Why Modernizing Security is Like Visiting a Fast-Food Restaurant&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">The Ins and Outs of SOC for MSSPs and MSPs&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Demisto &amp; Uptycs: Orchestrating Incident Response Activities&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Secureworks Unveils 24\/7 Threat Detection and Response Service&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">IBM: Average Destructive Attacks Costs Over $200 Million&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Cylance report looks into questionable pentesting practices&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Nmap 7.80 released: A mature Npcap Windows packet capturing driver, 11 new NSE scripts&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">NTT Security partners with Europol to bolster Threat Intelligence&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">ConnectWise Identifies MSP Security Holes Through Risk Assessments&nbsp;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Stronger as One: IronNet Expands the Power of Collective Defense to Organizations of All Sizes&nbsp;<\/font><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/r\/2019\/02\/22\/d12e5909-d228-4e39-af16-84422fb11c6e\/thumbnail\/770x578\/0dc6ee1748374f4fcf986de5bbbba180\/istock-857874124.jpg\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>Security warning for software developers: You are now prime targets for phishing attacks<\/strong><br \/>\n<em>Anny Palmer<\/em>&nbsp;<br \/>\n<em>ZD Net<\/em>&nbsp;<br \/>\nSoftware developers are the people most targeted by hackers conducting cyberattacks against the technology industry, with the hackers taking advantage of the public profiles of individuals working in the high-turnover industry to help conduct their&nbsp;phishing campaigns.<br \/>\nThe August 2019 Threat Intelligence Bulletin from cybersecurity company Glasswall details the industries most targeted by phishing, with the technology sector accounting for almost half of malicious phishing campaigns.<br \/>\nAccording to the Glasswall report, software developer is the role most targeted by hackers going after the technology sector.<br \/>\nA key reason for this is that devs do the groundwork on building software and will often have administrator privileges across various systems.<br \/>\nThat&#8217;s something attackers can exploit to move laterally around networks and gain access to their end goal.<br \/>\nOne way potential victims could make themselves less susceptible to attacks would be to display less information about themselves on their public-facing profiles \u2013 although given this is how many look for work, that might not be practical for everyone.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/security-warning-for-software-developers-you-are-now-prime-targets-for-phishing-attacks\/\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/www.zdnet.com\/article\/security-warning-for-software-developers-you-are-now-prime-targets-for-phishing-attacks\/<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/blog.tmcnet.com\/blog\/rich-tehrani\/wp-content\/uploads\/2019\/08\/apex-infographic-article-version-8-9-1-768x456.jpg\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>[Infographic] Nations and Hackers Unleash Destructive Malware!<\/strong><br \/>\n<em>Rich Tehrani<\/em>&nbsp;<br \/>\n<em>Tehrani Blog<\/em>&nbsp;<br \/>\nA new&nbsp;report&nbsp;from IBM X-Force Incident Response and Intelligence Services (IRIS) shows that these attacks have been on the rise, posing a growing threat to a wide variety of businesses that may not consider themselves an obvious target.<br \/>\nKey findings include:<br \/>\n\u2022 Massive destruction, massive costs:&nbsp;Destructive attacks are costing multinational companies $239 million on average.<br \/>\nAs a point of comparison, this is 61 times more costly than the average&nbsp;cost of a data breach&nbsp;($3.92 million).<br \/>\n\u2022 The long road to recovery:&nbsp;The debilitating nature of these attacks requires a lot of resources and time to respond and remediate, with companies on average requiring 512 hours from their incident response team.<br \/>\nIt\u2019s also common for organizations to use multiple companies to handle the response and remediation, which would increase hours even further.<br \/>\n\u2022 RIP laptops:&nbsp;A single destructive attack destroys 12,000 machines per company on average \u2014 creating quite a tab for new devices in order to get companies\u2019 workforce back in action.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/blog.tmcnet.com\/blog\/rich-tehrani\/security\/infographic-nations-and-hackers-unleash-destructive-malware.html\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/blog.tmcnet.com\/blog\/rich-tehrani\/security\/infographic-nations-and-hackers-unleash-destructive-malware.html<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/3ovyg21t17l11k49tk1oma21-wpengine.netdna-ssl.com\/wp-content\/uploads\/2016\/01\/favicon-logo-200x200.png\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>Why Modernizing Security is Like Visiting a Fast-Food Restaurant<\/strong><br \/>\n<em>Jonathan Divincenzo<\/em>&nbsp;<br \/>\n<em>Dev Ops.com<\/em>&nbsp;<br \/>\nFast casual restaurants are taking over the food industry.<br \/>\nToday\u2019s consumers want quality and speed, and the brick-and-mortar model offering immediate service paired with quality ingredients perfectly fits the bill.<br \/>\nIt\u2019s the new, modernized dining experience.<br \/>\nYou can also argue that the same modernization taking the food industry by storm is happening in the security sector.<br \/>\nA modern infrastructure mix is made up of many parts (much like a layered chicken sandwich): cloud, containers, hardware, platforms\u2014and sometimes serverless.<br \/>\nFlexibility and deployment options are essential to defending applications and APIs across multiple components and delivery stacks.<br \/>\nTypically, security teams end up in a balancing act of supporting new infrastructure plans while taking over existing legacy systems and applications.<br \/>\nThe modern world is ever-evolving and the definition of \u201cmodern\u201d changes as new technology is introduced.<br \/>\nFast-food chains have evolved over the years and, in turn, moved the food industry forward with the introduction of fast, casual and reliable options.<br \/>\nThe companies continue to evolve to meet the customers\u2019 demands by introducing delivery services, unique rewards programs and leading mobile apps.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/devops.com\/why-modernizing-security-is-like-visiting-a-fast-food-restaurant\/\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/devops.com\/why-modernizing-security-is-like-visiting-a-fast-food-restaurant\/<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/www.darkreading.com\/default.asp\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?<\/strong><br \/>\n<em>Ray Overby<\/em>&nbsp;<br \/>\n<em>Dark Reading<\/em>&nbsp;<br \/>\nThe old-school technology is experiencing new popularity, but too many people assume mainframes are inherently secure.<br \/>\nCase in point: IBM&#8217;s Z series mainframe sales are up 70% year-over-year.<br \/>\nAnd a recent Compuware survey showed that mainframe workloads are increasing.<br \/>\nCurrently, 57% of enterprises with a mainframe run more than half of their critical applications on the mainframe, but that number is expected to rise to 64% by next year, according to Compushare.<br \/>\nOverlooking mainframe security is an industrywide issue today.<br \/>\nRecent research shows that even though 85% of companies say that mainframe security is a top priority, 67% admit that they only sometimes or rarely factor security into mainframe environment decisions.<br \/>\nUltimately, the mainframe renaissance will equip businesses with the processing power, reliability, and scalability they need to thrive.<br \/>\nBut for true peace of mind, especially where sensitive customer data is involved, businesses need to be aware of the importance of mainframe security and, just as importantly, prepared to execute on it.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/the-mainframe-is-seeing-a-resurgence-is-security-keeping-pace\/a\/d-id\/1335476\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/www.darkreading.com\/vulnerabilities&#8212;threats\/the-mainframe-is-seeing-a-resurgence-is-security-keeping-pace\/a\/d-id\/1335476<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/www.channelpartnersonline.com\/files\/2019\/08\/Out-and-In-doors-300x249.jpg\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>The Ins and Outs of SOC for MSSPs and MSPs<\/strong><br \/>\n<em>Edward Gately<\/em>&nbsp;<br \/>\n<em>Channel Partners<\/em>&nbsp;<br \/>\nTo be successful as an MSSP or security-centric MSP, security operations center (SOC) is a must.<br \/>\nChannel Partners: What are some of the issues to consider when deciding whether to build your own SOC or outsource?<\/p>\n<ul>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\">Cost \u2013 building a SOC could cost $1-3 million depending on the size and scope.&nbsp;&nbsp;<\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\">Timing \u2013 some partners may find that it\u2019s better to outsource the SOC to ensure your sales team is capable of selling the solution before you invest in building it yourself.&nbsp;&nbsp;<\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\">Skills \u2013 finding qualified people to work as SOC analysts is very difficult, so make sure that you have a pipeline of these rare resources before you invest.<\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\">Scope \u2013 you need to decide early if you will staff for 24\u00d77 or 9\u00d75. Maybe you should partner for the after-hours work.<\/li>\n<\/ul>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\">CP: What are some common mistakes to avoid when building your own SOC?<br \/>\nAR: Automation needs to be top of mind from the start.<br \/>\nA security information and event management (SIEM) solution alone with SOC analysis to sift through the data will not be effective unless you can automate some of the incident response to help you scale.<br \/>\nCP: What\u2019s the best criteria for choosing a specialist to handle your SOC?<br \/>\nIT people think in a structured way with rules, policies and procedures \u2013 but hackers are very unstructured and creative.<br \/>\nTo catch a hacker, you need to think like them, so hire a former programmer with problem-solving skills.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/www.channelpartnersonline.com\/article\/the-ins-and-outs-of-soc-for-mssps-and-msps\/\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/www.channelpartnersonline.com\/article\/the-ins-and-outs-of-soc-for-mssps-and-msps\/<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/03\/cropped-SB3x4-270x270.jpg\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>Demisto &amp; Uptycs: Orchestrating Incident Response Activities<\/strong><br \/>\n<em>Security Boulevard<\/em>&nbsp;<br \/>\nUptycs leverages the open-source osquery agent in order to acquire real-time data about nearly any facet of your infrastructure (more about osquery here).<br \/>\nThis data is streamed, aggregated, and stored in the Uptycs backend and then made accessible via our API, allowing the integration of Uptycs data with other services.<br \/>\nThe Uptycs-Demisto integration (available here in the Demisto Integration catalog) allows customers of both solutions the use of Uptycs data within their Demisto instance.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/securityboulevard.com\/2019\/08\/demisto-uptycs-orchestrating-incident-response-activities\/\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/securityboulevard.com\/2019\/08\/demisto-uptycs-orchestrating-incident-response-activities\/<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/www.msspalert.com\/wp-content\/uploads\/2019\/03\/secureworks-2019.jpg\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>Secureworks Unveils 24\/7 Threat Detection and Response Service<\/strong><br \/>\n<em>Dan Kobialka<\/em>&nbsp;<br \/>\n<em>MSSP Alert<\/em>&nbsp;<br \/>\nSecureworks, a Top 100 MSSP, has added a 24\/7 service to its Red Cloak Threat Detection and Response (TDR) offering.<br \/>\nRed Cloak TDR\u2019s 24\/7 service helps organizations scale their security expertise and combat cyber threats, according to Secureworks.<br \/>\nIn doing so, the service enables organizations to accelerate threat detection, response and remediation.<br \/>\nThe 24\/7 service for Red Cloak TDR is now available.<br \/>\nAlso, Secureworks is showcasing its updated version of Red Cloak TDR at this week\u2019s Black Hat USA conference in Las Vegas, Nevada.<br \/>\nRed Cloak TDR is a managed detection and response (MDR) offering designed to help organizations identify cyber threats that typically go undetected by traditional security solutions, Secureworks noted.<br \/>\nIt uses insights from incident response engagements to provide continuously updated threat intelligence and analytics that enables organizations to recognize malicious activity.<br \/>\nIn addition, Red Cloak TDR&nbsp;analyzes data from IT environments and applies advanced analytics and threat intelligence, Secureworks said.<br \/>\nIt then alerts end users if it identifies suspicious activity that requires attention.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/www.msspalert.com\/cybersecurity-companies\/mssps\/secureworks-threat-detection\/?utm_medium=email&amp;utm_source=sendpress&amp;utm_campaign\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/www.msspalert.com\/cybersecurity-companies\/mssps\/secureworks-threat-detection\/?utm_medium=email&amp;utm_source=sendpress&amp;utm_campaign<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/www.msspalert.com\/wp-content\/uploads\/2018\/10\/ibm-x-force-command-center.jpg\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>IBM: Average Destructive Attacks Costs Over $200 Million<\/strong><br \/>\n<em>Dan Kobialka<\/em>&nbsp;<br \/>\n<em>MSSP Alert<\/em>&nbsp;<br \/>\nDestructive malware, malicious software with the capability to render affected systems inoperable, represents a growing problem for global organizations, according to IBM X-Force Incident Response and Intelligence Services (IRIS).<br \/>\nLarge multinational companies appear to incur costs around $239 million per destructive malware incident \u2014 61 times greater than the cost of a typical data breach, IBM IRIS noted.<br \/>\nFurthermore, the average destructive malware attack affects 12,316 computer workstations and servers and requires 512 hours to remediate.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/www.msspalert.com\/cybersecurity-research\/ibm-destructive-malware-costs\/?utm_medium=email&amp;utm_source=sendpress&amp;utm_campaign\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/www.msspalert.com\/cybersecurity-research\/ibm-destructive-malware-costs\/?utm_medium=email&amp;utm_source=sendpress&amp;utm_campaign<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/securitybrief.asia\/brands\/sb-as-icon-32.png\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>Cylance report looks into questionable pentesting practices<\/strong><br \/>\n<em>Security Brief &#8211; Asia<\/em>&nbsp;<br \/>\nBlackBerry has announced that new research from the BlackBerry Cylance Threat Intelligence Team has uncovered a trove of highly sensitive data.&nbsp;<br \/>\nIn&nbsp;Thin Red Line: Penetration Testing Practices Examined, the BlackBerry Cylance Threat Intelligence Team sheds light on a range of questionable pentesting practices, by-products and outcomes.<br \/>\nThe report raises critical questions about the industry\u2019s adherence to expectations of privacy and confidentiality, as well as compliance with legal and regulatory requirements, like Europe\u2019s General Data Protection Regulation (GDPR).&nbsp;<br \/>\nIncluded in the report is a case study of an advanced persistent threat (APT) like group which the research team found to be operating openly as a Brazilian security firm that is linked to the exposure of sensitive air traffic control data.<br \/>\nThe research also explores the tradecraft of more than two dozen well-known companies offering pentesting services, from boutiques to blue chips, and finds the widespread exposure of client data in semi-public repositories.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/securitybrief.asia\/story\/cylance-report-looks-into-questionable-pentesting-practices\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/securitybrief.asia\/story\/cylance-report-looks-into-questionable-pentesting-practices<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/www.helpnetsecurity.com\/wp-content\/themes\/hns\/favicon.ico\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>Nmap 7.80 released: A mature Npcap Windows packet capturing driver, 11 new NSE scripts<\/strong><br \/>\n<em>Help Net Security<\/em>&nbsp;<br \/>\nIt includes a mature Npcap raw packet capturing\/sending driver, 11 new NSE scripts, a bunch of new libraries, bug fixes and performance improvements.<br \/>\nNmap team has created the Npcap raw packet capturing\/sending driver because the previously used Winpcap hasn\u2019t been updated since 2013, doesn\u2019t always work on Windows 10, and depends on long-deprecated Windows APIs.<br \/>\nNpcap uses modern APIs, is more performant, secure and featureful.<br \/>\nNmap 7.80 updates the bundled Npcap from version 0.99-r2 to 0.9982, including all changes from the last 15 Npcap releases.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/www.helpnetsecurity.com\/2019\/08\/12\/nmap-7-80\/\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/www.helpnetsecurity.com\/2019\/08\/12\/nmap-7-80\/<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/static.responsesource.com\/favicon.ico\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>NTT Security partners with Europol to bolster Threat Intelligence<\/strong><br \/>\n<em>Response Source<\/em>&nbsp;<br \/>\nNTT Security, the specialised security company of NTT Group, has signed a Memorandum of Understanding (MoU) with Europol\u2019s European Cybercrime Centre (EC3).<br \/>\nThis latest move forms part of its committment to sharing its strategic threat intelligence with industry partners and law enforcement agencies to prevent cybercrime globally.<br \/>\nThe new MoU defines a framework for NTT Security and Europol to exchange strategic threat intelligence as well as information relating to cybersecurity trends and industry best practice.<br \/>\nTrust building through public-private sector partnerships is a priorty for NTT Security as it looks to enhance it\u2019s relationship with EC3 which now includes NTT Security\u2019s Global Threat Intelligence and Incident Center (GTIC)<br \/>\nEuropol is one of many partners with whom NTT Security collaborates.<br \/>\nOthers include the National Cyber Forensics and Training Alliance (NCFTA); Council of Registered Ethical Security Testers (CREST); Cyber Threat Alliance (CTA) Forum of Incident Response Teams (FIRST) and others.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/pressreleases.responsesource.com\/news\/98221\/ntt-security-partners-with-europol-to-bolster-threat-intelligence\/\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/pressreleases.responsesource.com\/news\/98221\/ntt-security-partners-with-europol-to-bolster-threat-intelligence\/<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/www.channelfutures.com\/wp-content\/themes\/channelfutures_child\/assets\/images\/icons\/favicon\/apple-touch-icon.png\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>ConnectWise Identifies MSP Security Holes Through Risk Assessments<\/strong><br \/>\n<em>Maddie Bacon<\/em>&nbsp;<br \/>\n<em>Channel Futures<\/em>&nbsp;<br \/>\nMore than half of MSPs don\u2019t do basic security awareness training, according to new data from ConnectWise.<br \/>\n57% of participating MSPs and SMBs don\u2019t do security awareness training, 48% have not assessed or analyzed cybersecurity attack targets and tactics, and 48% don\u2019t have a security incident response plan in place \u2014 all while more than 60% of SMBs experience cyberattacks or data breaches, according to the \u201c2017 State of Cybersecurity in Small and Medium-Sized Businesses (SMB)\u201d report from Ponemon Institute.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/www.channelfutures.com\/security\/connectwise-identifies-msp-security-holes-through-risk-assessments\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/www.channelfutures.com\/security\/connectwise-identifies-msp-security-holes-through-risk-assessments<\/a><\/p>\n<p style=\"margin: 1em 0;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 15px;line-height: 150%;text-align: left;\"><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/ironnet.com\/wp-content\/uploads\/IronNet-Featured-Image.jpg\" width=\"16\" style=\"border: 0;outline: none;text-decoration: none;-ms-interpolation-mode: bicubic;height: auto !important;\">&nbsp;<strong>Stronger as One: IronNet Expands the Power of Collective Defense to Organizations of All Sizes<\/strong><br \/>\n<em>Iron Net<\/em>&nbsp;<br \/>\nNew strategic initiative will improve cyber defense collaboration and security outcomes across organization and industry<br \/>\nIronNet Cybersecurity, the leading provider of collective defense and network behavioral analysis for companies and industries, today announces that IronDome, the industry\u2019s first and only collective defense platform, is now available to companies of all sizes.<br \/>\nIronDome is a revolutionary way to defend against sophisticated and well-funded cyber adversaries by enabling organizations to join resources and envision impending potential threats to collectively defend against targeted attacks.<br \/>\nThe platform applies advanced behavioral analytics, AI, and machine learning techniques to network traffic data and combines the tradecraft knowledge of the best offensive and defensive cyber operators in the world with world-class mathematicians and data scientists.<br \/>\nThis IronDome expansion will be the first cross-sector sharing initiative at scale.<br \/>\nAdditional initiatives will be launched to complement other public-private sharing entities and to provide a real-time anonymized view into domestic and international threats for cyber response.<br \/>\n<font color=\"blue\"><strong>Link:<\/strong><\/font>&nbsp;<a href=\"https:\/\/ironnet.com\/new\/stronger-as-one-ironnet-expands-the-power-of-collective-defense-to-organizations-of-all-sizes\/\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">https:\/\/ironnet.com\/new\/stronger-as-one-ironnet-expands-the-power-of-collective-defense-to-organizations-of-all-sizes\/<\/a><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\t\t\t\t<!--[if mso]>\n\t\t\t\t<\/td>\n\n\n\t\t\t\t<![endif]--><\/p>\n<p>\t\t\t\t<!--[if mso]>\n\t\t\t\t<\/tr>\n\n\n\t\t\t\t<\/table>\n\n\n\t\t\t\t<![endif]-->\n            <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>                                    <!-- \/\/ END BODY -->\n                                <\/td>\n<\/tr>\n<tr>\n<td align=\"left\" valign=\"top\" style=\"mso-table-lspace: 0pt;mso-table-rspace: 0pt;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\">\n                                    <!-- BEGIN FOOTER \/\/ --><\/p>\n<table border=\"0\" cellpadding=\"0\" cellspacing=\"0\" width=\"600\" id=\"templateFooter\" style=\"border-collapse: collapse;mso-table-lspace: 0pt;mso-table-rspace: 0pt;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;min-width: 100%;border-top: 0;\">\n<tr>\n<td valign=\"top\" class=\"footerContainer\" style=\"padding-top: 9px;padding-bottom: 9px;mso-table-lspace: 0pt;mso-table-rspace: 0pt;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\">\n<table border=\"0\" cellpadding=\"0\" cellspacing=\"0\" width=\"100%\" class=\"mcnTextBlock\" style=\"min-width: 100%;border-collapse: collapse;mso-table-lspace: 0pt;mso-table-rspace: 0pt;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\">\n<tbody class=\"mcnTextBlockOuter\">\n<tr>\n<td valign=\"top\" class=\"mcnTextBlockInner\" style=\"mso-table-lspace: 0pt;mso-table-rspace: 0pt;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\">\n<table align=\"left\" border=\"0\" cellpadding=\"0\" cellspacing=\"0\" width=\"100%\" style=\"min-width: 100%;border-collapse: collapse;mso-table-lspace: 0pt;mso-table-rspace: 0pt;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\" class=\"mcnTextContentContainer\">\n<tbody>\n<tr>\n<td valign=\"top\" class=\"mcnTextContent\" style=\"padding-top: 9px;padding-right: 18px;padding-bottom: 9px;padding-left: 18px;mso-table-lspace: 0pt;mso-table-rspace: 0pt;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-family: Helvetica;font-size: 11px;line-height: 125%;text-align: left;\">\n<p>                            <em>Copyright \u00a9 *|CURRENT_YEAR|* *|LIST:COMPANY|*, All rights reserved.<\/em><\/p>\n<p><strong>Our mailing address is:&nbsp;<a href=\"mailto:dailynews@paulgdavis.com\" target=\"_blank\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\" rel=\"noopener\">dailynews@paulgdavis.com<\/a><\/strong><\/p>\n<p>\nIf someone forwarded this email to you and you want to be added in,<br \/>\nplease click this&nbsp;<a class=\"utilityLink\" href=\"SUBSCRIBE|*\" target=\"_blank\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\" rel=\"noopener\">subscribe to this list<\/a><\/p>\n<p><a class=\"utilityLink\" href=\"*|UNSUB|*\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">unsubscribe from this list<\/a>&nbsp;&nbsp;&nbsp;<br \/>\n<a class=\"utilityLink\" href=\"*|UPDATE_PROFILE|*\" style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;color: #202020;font-weight: normal;text-decoration: underline;\">update subscription preferences<\/a>&nbsp;<\/p>\n<p>*|IF:REWARDS|* *|HTML:REWARDS|* *|END:IF|*\n                        <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>                                    <!-- \/\/ END FOOTER -->\n                                <\/td>\n<\/tr>\n<\/table>\n<p>                        <!-- \/\/ END TEMPLATE -->\n                    <\/td>\n<\/tr>\n<\/table>\n<p>        <\/center><br \/>\n    <\/body><br \/>\n<\/html><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1264","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1264","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1264"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1264\/revisions"}],"predecessor-version":[{"id":3751,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1264\/revisions\/3751"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}