DATA SECURITY

CyCognito Teams with Intel 471 to Bolster Cyber Threat Intelligence Capabilities

CyCognito | December 13, 2021

CyCognito Teams with Intel 471 to Bolster Cyber Threat Intelligence Capabilities
CyCognito, the leading provider of external attack surface management and attack surface protection solutions, today announced that it has established a new alliance with Intel 471, a premier cybercrime intelligence provider.

CyCognito addresses a fundamental security gap created when organizations use the internet to create IT ecosystems that span on-premises, cloud, partner and subsidiary environments. In licensing the threat intelligence collected by Intel 471, CyCognito is further enabling enterprise customers to strengthen their cybersecurity postures through the proactive detection and containment of targeted and advanced threats.

“CyCognito is committed to helping businesses prevent breaches by providing them with unparalleled attack surface visibility, data exposure, and risk detection across previously unknown and unmanaged assets,Our partnership with Intel 471 expands these capabilities, giving us the ability to provide our customers and partners with curated data and insights around new and emerging cyber threats, that are both richer and more relevant to their businesses. This in turn will help them customize their cyber defenses and improve their ability to successfully identify and address cyber risk within their organizations.”

Rob Gurzeev, CEO and co-founder of CyCognito

Intel 471 CEO Mark Arena says, “As we’ve witnessed, businesses often find themselves falling behind the onslaught of threats and victim to cyber attacks—regardless of preparedness and adequate defenses. This alliance between Intel 471 and CyCognito will arm organizations worldwide with threat intelligence to combat sophisticated cybercriminals by identifying, prioritizing, and preventing attacks before they happen.”

About CyCognito
CyCognito solves one of the most fundamental business problems in cybersecurity: seeing how attackers view your organization, where they are most likely to break in, what systems and assets are at risk and how you can eliminate the exposure. Founded by national intelligence agency veterans, CyCognito has a deep understanding of how attackers exploit blind spots and a path of least resistance. The Palo Alto-based company is funded by leading Silicon Valley venture capitalists, and its mission is to help organizations protect themselves from even the most sophisticated attackers. It does this with a category-defining, transformative platform that automates offensive cybersecurity operations to provide reconnaissance capabilities superior to those of attackers.

About Intel 471
Intel 471 empowers enterprises, government agencies, and other organizations to win the cybersecurity war using near-real-time insights into the latest malicious actors, relationships, threat patterns, and imminent attacks relevant to their businesses.

The company’s TITAN platform collects, interprets, structures, and validates human-led, automation-enhanced results. Clients across the globe leverage this threat intelligence with our proprietary framework to map the criminal underground, zero in on key activity, and align their resources and reporting to business requirements. Intel 471 serves as a trusted advisor to security teams, offering ongoing trend analysis and supporting your use of the platform.

Spotlight

"Penetration testing is much more than a necessary process to satisfy compliance obligations: it is a critical first step in the information and network security lifecycle and an important component of a full IT Security Compliance program.

This white paper defines the different types of penetration tests and clearly explains the reasons why an organization should perform the tests. Readers will not only find out the benefits penetration tests can provide, but also where they tend to fall short. Finally, this resource will provide guidance for organizations on choosing the right vendor to perform penetration tests."

Related News

Coronavirus-themed Cyberattacks on Businesses Rise, Experts Recommend Beefing Up Network Security

chamberbusiness | May 06, 2020

In recent weeks reveal the need for businesses to double down on security to ensure their networks are protected, a leading cyber security expert said. . Many of the attacks were ransomware, holding companies’ network systems hostage until a payout was made. . Under COVID-19, cyber criminals are having a field day, honing in on companies in countries like the United States that are in the throes of fighting the virus.. An uptick of coronavirus-themed cyber attacks on hospitals, pharmaceutical laboratories and even the trucking industry in recent weeks reveal the need for businesses to double down on security to ensure their networks are protected, a leading cyber security expert said. Many of the attacks were ransomware, holding companies’ network systems hostage until a payout was made. Some companies, particularly small and mid-sized businesses, might not survive such an attack, said John Zanni, CEO of Scottsdale-based Acronis SCS, a leader in edge data security and cyber protection in the U.S. public sector. Zanni strongly advises organizations to beef up network safety. The cost is minimal and today’s technology is highly effective. A large organization that has its IT system knocked out can pay in the “hundreds of thousands to millions of dollars” to fly in a forensics firm to fix the damage, Zanni said. For smaller private sector entities, the cost can put them out of commission. Learn more: SINGLE LAYERS OF SECURITY AREN’T ENOUGH TO PROTECT YOUR ORGANIZATION’S DATA . “The pandemic has increased impacts on businesses significantly. Unfortunately, many are not equipped to deal with them” . ~ Zanni says A large organization that has its IT system knocked out can pay in the “hundreds of thousands to millions of dollars” to fly in a forensics firm to fix the damage, Zanni said. For smaller private sector entities, the cost can put them out of commission.“If someone breaks into your business, you call 911,” he said. “If you call 911 and say, ‘I’m suffering a ransomware attack,’ they don’t know what to do. It’s a big problem.” COVID-19 has brought the issue into the limelight as more employees work from home, doctors conduct telemedicine appointments, and online purchases soar. “So now we’re all working at home and the bad guys have realized there are a lot of holes in being connected to a corporate network or other business from home systems.” Under COVID-19, cyber criminals are having a field day, honing in on companies in countries like the United States that are in the throes of fighting the virus. To illustrate the threat, only 190 domain names included the word ‘corona’ last year, Zanni said. In March, there were more than 30,000. “Some are legitimate but most of them are not,” he said. “We’ve also seen a 127 percent increase in exposed desktop protocol endpoints. Anyone with connectivity is at risk. Phishing scams claiming to be from the Centers for Disease Control and the World Health Organization are a common ruse right now. While all businesses are at risk, the majority of cyber attackers target government agencies in search of sensitive data, Zanni said. That impacts businesses as well. When Baltimore had to shut down operations after a cyber attack last year, companies were unable to carry out everyday transactions like getting permits approved and bills paid. The city lost millions of dollars in potential and delayed revenue. Atlanta and New Orleans also were hit by cyber attacks in the past two years, also costing millions of dollars in recovery costs. Learn more: HOW ORGANIZATIONS CAN PREPARE FOR CYBERSECURITY .

Read More

DATA SECURITY

MITRE Invention to Test Cybersecurity Products Against Data Encryption Risks, Such as Ransomware

MITRE Engenuity | March 17, 2021

Miter Engenuity will survey business cybersecurity items' capacity to identify the danger presented by the gatherings normally known as Sandworm and Wizard Spider, both of whom have utilized information encryption as a vital component of their attacks. Applications for assessment are accessible through May 28. Examiners accept that Sandworm utilized information encryption to cause more than $10 billion in harm to industry in attacks with its NotPetya malware. The gathering is additionally generally associated with attacks that have closed down the Ukrainian electrical framework on various events. Wizard Spider has purportedly utilized information encryption to take more than $150 million through ransomware attacks. The assessments will utilize ATT&CK®, a Miter-curated information base of foe strategies, methods, and techniques that depends on distributed danger revealing. ATT&CK is openly accessible and is utilized by digital safeguards in regions including account, medical services, energy, assembling, retail, and government to comprehend enemy conduct and tradecraft. Miter Engenuity will assess each partaking merchant's capacity to recognize the dangers presented by Sandworm and Wizard Spider in two particular situations during the assessment. All outcomes will be delivered, and the organization will permit the general population to see them completely or sifted by enemy.

Read More

DATA SECURITY

Major European Banks Invest In DDoS Attack Simulation Platform From HUB Security

HUB Security | December 10, 2021

HUB Security announced its 2021 summary of sales for its D.Storm product to several leading customers in Israel, as well as three central banks in Europe, for an accumulated revenue of approximately €1 Million. D.Storm is HUB Security's unique cybersecurity SaaS platform for the simulation of DDoS attacks, where cybercriminals flood servers with false data to cause websites to crash. HUB Security developed the product by utilizing its many years of experience conducting risk assessments and analyzing the attack patterns of cyberattackers for customers around the world. "DDoS attacks are becoming more frequent, larger in size, and longer with the use of new botnets,The strong sales and feedback of D.Storm indicate that companies are responding seriously and conducting rigorous testing to better understand how to upgrade their cybersecurity programs." Eyal Moshe, CEO and co-founder of HUB Security HUB Security also announced that it is currently in advanced negotiations for the sale of D.Storm to a number of additional customers in Israel and abroad. Three more global banks are also in the process of having advanced proof-of-concept (PoC) discussions. HUB Security estimates that it will soon finalize additional contracts worth millions of Euros in sales in 2022. The purpose of D.Storm is to identify vulnerabilities and exploits in an organization's infrastructure by replicating real-world attack methods using fully automated tools. The platform enables customers to run dozens of DDoS attack methods, including volumetric, infrastructure, and application attacks. With the aid of tens of thousands of attack bots that spread across different countries and continents, D.Storm is fully capable of imitating real browsers, which simulates the challenge of distinguishing between fake and legitimate users. The platform collects data from the bot attacks in real-time and presents it to the user for in-depth analysis. This approach allows customers to substantially minimize their attack surface and prepare measures to withstand potential DDoS attacks on their strategic and sensitive assets. HUB Security estimates that sales of the solution are expected to have a material effect on its activities in 2022. About HUB Security HUB Security was established in 2017 by veterans of the 8200 and 81 elite intelligence units of the Israeli Defense Forces. The company specializes in unique Cyber Security solutions protecting sensitive commercial and government information. The company debuted an advanced encrypted computing solution aimed at preventing hostile intrusions at the hardware level while introducing a novel set of data theft prevention solutions. HUB operates in over 30 countries and provides innovative cybersecurity computing appliances as well as a wide range of cybersecurity professional services worldwide.

Read More

Spotlight

"Penetration testing is much more than a necessary process to satisfy compliance obligations: it is a critical first step in the information and network security lifecycle and an important component of a full IT Security Compliance program.

This white paper defines the different types of penetration tests and clearly explains the reasons why an organization should perform the tests. Readers will not only find out the benefits penetration tests can provide, but also where they tend to fall short. Finally, this resource will provide guidance for organizations on choosing the right vendor to perform penetration tests."