Software Security

Criminal IP New Cybersecurity Search Engine launches first beta test

AI Spera | April 12, 2022

AI Spera
AI Spera announced Criminal IP, a new cybersecurity platform, today. Criminal IP is a total Cyber Threat Intelligence (CTI) search engine intended to identify potential vulnerabilities that threatening companies or individuals' IT assets. It also offers a new way to manage them comprehensively by allowing users to find results for malicious IP address, malicious domains, phishing sites, forged certificates, all IT assets, and other security related information immediately.

The company has been recruiting beta service testers and plans to operate beta service for three months from April 28. Testers pre-registering for beta service will be given a three-month free license and if testers participate in the service survey, they can receive an additional one-month free license as a reward.

Criminal IP visualizes all IT assets connected to the Internet based on IP addresses held by companies and individuals. This allows users to see the details of their assets at a glance, from DB servers, files servers, middleware servers, administrator servers as well malicious sites, and easily spot the assets exposed to the attack surface.

The solution also provides all possible information about domains in real time, including network logs, used programming technologies and security-related information, without having to directly access websites. Analyzing this information with AI/Machine learning technology, it shows an overall score of the domain and DGA (Domain Generation Algorithm) score in five stages (Critical, Dangerous, Moderate, Low, Safe) allowing users to determine and respond to threats.

Users can prevent security problems in advance by searching for vulnerabilities in IT assets and identifying cyber attackers' attack points for attack surface management purposes through Criminal IP data. In addition, everything that has happened to a particular IP address can be recorded like a criminal record to track malicious behavior of an IP address.

"Above all, this platform is the ultimate comprehensive solution that maximizes user's convenience by providing all CTI information distributed by different solutions in one place. In hopes that Criminal IP can be used in a variety of areas to defend against evolving cyber threats, including education and research, corporate security teams, white hackers, state agencies, and cybercrime investigations, we decided to operate free beta services to receive feedback on product improvement."

Byungtak Kang, CEO at AI Spera

Features and benefits of Criminal IP include:

  • providing a wide range of cyber threat information, including malicious IPs, C&C domains, various domain information, threat intelligence images and CVEs, which map IP& Domain scoring algorithms and various threat information based on big data on 4.2 billion IP addresses and billions of domain addresses worldwide
  • analyzing all possible details about domains including screenshots, domain category, whois information, used technologies, connected IP addresses, page redirections, certificates, network logs, cookies as well as interesting security-oriented features like possible malicious contents and replicated phishing domains with overall score of the domain and DGA (Domain Generation Algorithm) score
  • searching and updating global IP addresses and domains in 24/7 to extract applications and services in use, and provide information on security vulnerabilities of IT assets to enable real-time automatic attack surface management
  • offering straightforward search result based on a wide range of specific search filters so that users can conveniently access the right information they need

About AI Spera
AI Spera is a fast-growing company in the field of cyber threat intelligence. Based on AI and Machine Learning technology, the company focuses on detection of anomalies and data-oriented security solutions. The company supports as many corporates, security developers and researchers as possible to view the attack surface through the eyes of an attacker and provide various AI-based intelligence security solutions across industries including online games, financial, security and national institutions.

Spotlight

More than 90% of the threats that reach user inboxes, including BEC, rely on email impersonation. They pass through email security gateways and use social engineering to compromise their targets. In this report, we examine campaigns, tactics, and infrastructure used in recent BEC and email impersonation attacks so that organizat

Spotlight

More than 90% of the threats that reach user inboxes, including BEC, rely on email impersonation. They pass through email security gateways and use social engineering to compromise their targets. In this report, we examine campaigns, tactics, and infrastructure used in recent BEC and email impersonation attacks so that organizat

Related News

Enterprise Security, Web Security Tools

Netskope Achieves AWS Security Competency Status for Infrastructure Protection

PR Newswire | August 28, 2023

Netskope, today announced that it has achieved Amazon Web Services (AWS) Security Competency status in the Infrastructure Protection category. As a widely recognized industry leader in secure access service edge (SASE), Security Service Edge (SSE), and modern connectivity and performance, Netskope works with AWS and other cloud providers to secure and optimize the most demanding cloud-first environments. Achieving the AWS Security Competency differentiates Netskope as an AWS Partner Network (APN) member that meets rigorous security specifications on AWS. In addition, Netskope was recently recognized as a "finalist" for the AWS US Rising Star Partner of the Year at this year's AWS New York Partner Summit. With the rapid migration of critical workloads to the cloud, the increase in the hybrid workforce, and today's complex cybersecurity landscape, the need for robust cloud security solutions is more critical than ever before. Netskope has helped thousands of customers, including more than 25 of the Fortune 100, improve their security posture. Netskope helps customers address AWS's shared responsibility model of cloud security for several important use cases: Provide secure remote access to private applications on AWS - Remote and hybrid workers need to access business-critical applications from anywhere. Netskope Private Access (NPA), Netskope's zero trust network access (ZTNA) solution, provides secure, granular access based on adaptive trust principles. This means that users can only access the applications and resources they need when they need them. NPA also improves security by replacing outdated VPN gateways and concentrators that expose their IP addresses to the public internet. Private resources are not visible on the public internet and are shielded from attackers. Discover shadow IT and block data exfiltration and threats - Netskope can act in real-time to block movement of sensitive data, threats, unauthorized users, and access to rogue accounts. Netskope Cloud Access Security Broker (CASB) Inline monitors traffic to and from AWS resources and applications to expose suspicious or malicious activity. Netskope's Zero Trust Engine decodes activities in real-time to place activity-level restrictions on users, groups, and organizational units across more than 270 AWS services. Netskope's Next Generation Secure Web Gateway (SWG) blocks malware, detects advanced threats, and controls cloud apps and services for users located anywhere, using any device. Discover sensitive data and malware in Amazon Simple Storage Service (Amazon S3) - Netskope CASB API scans Amazon S3 buckets to identify sensitive data and protect it from misuse. It also discovers malware and generates alerts to help prevent threats from spreading. Extensive integrations provide visibility and information sharing across cloud and hybrid environments - Netskope integrates with a variety of AWS services including AWS CloudTrail, AWS CloudTrail Lake, Amazon Security Lake, Amazon S3, and Amazon GuardDuty to share logs, alerts, events, and threat information. Netskope Cloud Exchange (CE) offers a wide variety of plug-ins and modules to facilitate exchange of information between cloud services, security tools, and data lakes, and automate remediation. CE can be deployed on Amazon Elastic Container Service (Amazon ECS) using AWS Fargate. Netskope also integrates with AWS Control Tower for customers needing automated deployment and consistent security policy across multi-account AWS customer environments. "We are thrilled to achieve the AWS Security Competency in the Infrastructure Protection category, as it highlights our ongoing commitment to help organizations provide secure access to applications and resources, protect data, and reduce risk in the cloud," said Andy Horwitz, Vice President, Business Development and Technology Alliances, Netskope. "This achievement demonstrates our commitment to AWS customers through our team's hard work and dedication to providing cutting-edge security solutions that address the evolving challenges of secure cloud adoption." AWS is enabling scalable, flexible, and cost-effective solutions from startups to global enterprises. To support the seamless integration and deployment of these solutions, AWS established the AWS Competency Program to help customers identify AWS Partners with deep industry experience and expertise. About Netskope Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. Fast and easy to use, the Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Netskope helps customers reduce risk, accelerate performance, and get unrivaled visibility into any cloud, web, and private application activity. Thousands of customers trust Netskope and its powerful NewEdge network to address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory requirements. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.

Read More

Enterprise Security, Platform Security, Software Security

SecPod releases SanerNow 6.0 to redefine Vulnerability Lifecycle Automation with Cyber Hygiene Score

Prnewswire | July 18, 2023

SecPod Technologies, a global leader in the cyberattack prevention industry, has released SanerNow 6.0, a new update to its flagship cyberattack prevention platform SanerNow. With a brand-new unified dashboard and an innovative Cyber Hygiene Score, SanerNow transforms how CISOs and security administrators combat cyberattacks and simplifies the process of vulnerability lifecycle automation. Chandrashekhar Basavanna, the CEO of SecPod, said, "We are very excited to launch a major upgrade to our SanerNow platform. Risk quantification has always been an intriguing concept industry-wide. We are taking a real shot at it with an innovative hygiene score. This will facilitate our Customers to quantify the risks their IT infrastructure is exposed to and implement vulnerability mitigation strategies. With an all-new dashboard, we are representing end-to-end vulnerability management with Visibility, Detection, Prioritization, and Mitigation coming together in a unified console." With Cyber Hygiene Score, based on SecPod's in-house security intelligence and proprietary algorithm, SanerNow quantifies an organization's cyber hygiene and provides insight into your IT infrastructure. Further, in combination with a unified dashboard, SanerNow provides a holistic view of your organization's risk exposure to take effective laser-focused actions. The new update, SanerNow 6.0, with the new dashboard and Cyber Hygiene Score, is now available for the general public. SecPod SanerNow Advanced Vulnerability Management is a comprehensive cyberattack prevention platform providing visibility and control over IT infrastructure, detection and prioritization of vulnerabilities, and vulnerability remediation in a single unified console. About SecPod SecPod is a SaaS-based cybersecurity technology company created with a singular, unwavering goal of preventing cyberattacks. Founded in 2008, the company provides a top-of-the-line advanced vulnerability management solution that strengthens organizations' cybersecurity posture worldwide.

Read More

Enterprise Security, Platform Security, Software Security

Conceal Enhances Browser Security in Strategic Partnership with NGS

Business Wire | August 17, 2023

Conceal, a forerunner in defending against web-based attacks, proudly announces its partnership with NGS, the UK's leading transformative cybersecurity solution provider. Through this collaboration, NGS clients will benefit immensely from Conceal's patented zero-trust browser solution, fortifying their web protection like never before. "As the cyber threat landscape evolves, it's crucial for businesses to be equipped with the most advanced tools to prevent potential breaches," said Jonathan Lassman, Founder and Director of NGS. "Integrating with Conceal allows us to provide our clients with a first-rate security solution that halts threats at the browser's doorstep, preventing data compromise and ensuring optimal user experience. We are thrilled about this partnership and ready to set new industry standards." Gordon Lawson, CEO of Conceal, shared, "NGS has proven its mettle in the cybersecurity arena, focusing on driving value and prioritizing user experience. This partnership will enable us to jointly address the sophisticated browser-based threats and challenges that modern businesses face. Together, we'll redefine web security for countless organizations." ConcealBrowse stands as a game-changer in the realm of web-browser security. Seamlessly integrating with existing security infrastructures, it offers minimal setup hassle and supplies invaluable telemetry data compatible with SIEMs and popular analytical tools. About NGS With its motto, "Be Transformative," NGS has made significant strides in the cybersecurity world, bridging the gap between emerging technology challenges and security solutions. Through strategic collaborations with top-tier vendors, NGS offers unparalleled security solutions tailored to modern business needs. Their holistic approach, focusing on delivering more for less, has made them a go-to for businesses seeking to bolster their digital defenses without breaking the bank. About Conceal Conceal is at the forefront of defending against web-based attacks, using innovative technology to detect, prevent, and shield businesses and individual users from ever-evolving online threats. ConcealBrowse operates on the principle of proactive protection. Its AI-powered intelligence engine, ConcealSherpa, runs at machine speed with virtually zero latency to identify potentially harmful webpages autonomously, stopping cyber attacks that take advantage of weaponized links. For more information, visit https://conceal.io/.

Read More