Hackers are Using Coronavirus Maps to Spread Malware

Beingcrypto | March 17, 2020

Hackers have been using the fear of the coronavirus to spread an infection of their own in the form of malware that has been discovered within coronavirus tracking maps. [TechRadar] This marks yet another way that bad actors have taken advantage of the fears of the current virus outbreak, which is already disrupting businesses around the world on its own. As usual, cybercriminals are using any confusion, fear, resulting in chaos to capitalize on people��s fears. This is not even the first time something like this was done — back in January of this year, hackers launched a coronavirus-based email campaign to infect people with malware. Now, they have expanded their reach and are using online maps for the same purpose. Shai Alfasi, from Reason Labs, recently reported that hackers are creating fake versions of such maps and dashboards to steal information. They are after data including passwords and user names, credit card numbers, and any other sensitive data that they can collect.

Spotlight

In late 2022, an independent research firm completed their survey of 4,200 unbiased IT leaders and implementers on a variety of data protection drivers, challenges, and strategies — including 286 in Japan. This broad-based market study on unbiased organizations is conducted annually on Veeam’s behalf to understand how the data protection market continues to evolve, so that Veeam can ensure product strategies and market initiatives align with where the market is going.

Spotlight

In late 2022, an independent research firm completed their survey of 4,200 unbiased IT leaders and implementers on a variety of data protection drivers, challenges, and strategies — including 286 in Japan. This broad-based market study on unbiased organizations is conducted annually on Veeam’s behalf to understand how the data protection market continues to evolve, so that Veeam can ensure product strategies and market initiatives align with where the market is going.

Related News

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Orca Announces New Capabilities to Optimize Cloud Security and Cost

Orca Security | February 17, 2023

On February 16, 2023, Orca Security, a pioneer in agentless cloud security, announced that the Orca Cloud Security Platform now includes a cloud cost optimization framework, which assists organizations in reducing unnecessary cloud consumption and optimizing cloud costs while providing unrivaled security with the deepest and broadest visibility. By using its proprietary SideScanning™ technology, Orca is now applying unparalleled insights into cloud environments, thereby allowing organizations to track and manage cloud spend. Unlike other cloud cost management tools, Orca's platform has the ability to identify more opportunities for cloud cost savings by having a deeper understanding of cloud workloads and their operations. Despite considering cost efficiency a motivator for cloud adoption, several organizations are experiencing high expenses in their monthly cloud bills, mainly due to underutilization and forgotten cloud infrastructure resources. The 2022 State of the Cloud Report by Flexera indicates that organizations lose up to 32% of their monthly cloud expenses. Orca's Cloud Cost Optimization feature addresses the problem of wasteful cloud spending by continuously aggregating relevant alerts about unnecessary cloud infrastructure spending across all supported cloud service providers. These providers include Microsoft Azure, Amazon Web Services, Google Cloud, and Alibaba Cloud. In addition, the Orca platform simplifies the cost optimization process by categorizing alerts based on cloud infrastructure that is causing excessive spending, such as virtual machines, databases, keys, and load balancers, making deallocation quick and easy for organizations. Even though Stopped VMs on Google Cloud and AWS and deallocated VMs on Azure do not incur charges, many organizations are unaware that they still incur costs for the resources associated with those VMs until they are deleted. Orca assists organizations in recognizing resources attached to stopped or deallocated VMs to avoid incurring undesired charges, including Elastic IP addresses and EBS volumes on AWS, OS and data storage disks on Azure, and persistent disks and external IP addresses on Google Cloud. About Orca Security Founded in 2019, Orca Security is a leading global firm that provides agentless cloud security solutions to hundreds of enterprises. Its Cloud Security Platform can detect, prioritize, and fix security risks and compliance issues across cloud environments such as Azure, AWS, Google Cloud, and Kubernetes. The company's patented SideScanning™ technology and Unified Data Model make security possible for organizations moving to and scaling in the cloud and enable them to secure their cloud infrastructure while providing comprehensive coverage and visibility of all risks. With continuous first-to-market innovations, the Orca Platform ensures security teams can quickly identify and remediate risks, keeping businesses secure.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Lookout Announces Industry’s Only Endpoint to Cloud Security Platform

Lookout | January 31, 2023

Lookout, Inc., a business specializing in endpoint-to-cloud security, has announced enhanced capabilities and feature updates to its award-winning Lookout Cloud Security Platform, the only endpoint-to-cloud security solution available on the market. In addition to cloud, internet, and private applications, the cloud-native platform now includes a single policy architecture for administration and enforcement across all mobile devices. A single agent and a single control plane for mobile and cloud security services are also new platform upgrades, providing IT and security professionals with a cost-effective, streamlined administration experience. In addition, the Lookout Cloud Security Platform combines security service edge (SSE) with endpoint security to secure users and data regardless of location. It constantly monitors the risk posture of devices and users to provide dynamic and granular zero-trust access based on the sensitivity level of applications and data. As a result, it enables organizations to protect their workers, devices, applications, and data from unauthorized access and modern internet-based threats. In addition, the extended platform enables clients to make more educated choices about cloud security services using threat data from mobile endpoints. Lookout CEO, Jim Dolce, said, "Digital transformation and the significant adoption of the cloud have accelerated remote work and the use of mobile and unmanaged devices, which in turn exposes organizations to new security gaps that are ripe for exploitation from bad actors." He added, "Lookout's mission is to secure and empower the digital future where mobility and cloud are essential to all that we do for work and play; our endpoint to cloud security platform ensures that your data is protected – regardless of device, user or location." (Source – PR Newswire) The Award-Winning Lookout Platform The Lookout Cloud Security Platform integrates security services based on the company's unique technologies: Lookout Secure Private Access Lookout Secure Cloud Access Lookout Mobile Endpoint Security Lookout Secure Internet Access About Lookout, Inc. Lookout, Inc. is a cybersecurity firm that merges endpoint security with SASE technology to protect data while maintaining user privacy. Its single, cloud-native security platform protects data across devices, applications, networks, and clouds—a solution as fluid and adaptable as the current digital environment. Giving companies and people more control over their data empowers them to maximize its value and flourish. Lookout is trusted by organizations of all sizes, government agencies, and millions of individuals to safeguard sensitive data, allowing them to live, work, and connect freely and securely.

Read More

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

ReliaQuest Announces Launch of GreyMatter Phishing Analyzer

ReliaQuest | March 08, 2023

On March 7, 2023, ReliaQuest, a leading firm specializing in security operations, announced the addition of Phishing Analyzer to its GreyMatter platform, which is now available globally. This capability automates the entire abuse-mailbox management process, reducing the risk of phishing attacks by analyzing suspicious emails, taking remedial action, and sending follow-up notifications to users. Phishing attacks are a persistent and time-consuming issue, and although many organizations have Secure Email Gateways (SEGs) to combat email-based threats, malicious emails still manage to get through. Most phishing emails trick users into sharing valuable information, leading to costly Business Email Compromise (BEC) incidents that have cost organizations over $43 billion since 2016. In response, organizations are increasing their phishing awareness programs to empower contractors, employees and partners to help the security team battle against email phishing. However, the constant need for vigilance and alertness can lead to alert fatigue and burnout among employees. Even when users spot phishing emails, they need a way to notify security teams to prevent email-based attacks. GreyMatter Phishing Analyzer automates this process, allowing security teams to evaluate email-based threats in order to determine how they are gaining access and who has been affected, potentially saving thousands of hours and reducing employee dissatisfaction. GreyMatter Phishing Analyzer removes the burden of the abuse-mailbox by automatically analyzing reported emails to determine whether they are malicious or benign. If malicious, the reported email is removed from the user's inbox, as well as other matching emails from across the organization. Additionally, the tool enables security teams to see the full scope of the phishing attack without leaving the platform, and ReliaQuest's machine-learning capabilities speed up the analysis process, identifying phishing campaigns targeting the organization by matching against duplicate and similar emails across the organization. Once thoroughly analyzed, the tool automatically sends an analysis report to the security team and an analysis decision (benign or malicious) to the reporter, enabling security teams to add security controls for stronger protection. Overall, GreyMatter Phishing Analyzer can help organizations reduce the risk of phishing attacks and allow their employees to protect their organization better. About ReliaQuest ReliaQuest is a leading firm that boosts security operations. Its platform, GreyMatter, automates detecting, investigating, and responding to security threats across different tools and applications, including cloud, endpoint, and on-premise environments. The company has established a global presence, serving more than 700 customers, with 1,200 professionals spread across six operating centers worldwide. Its primary objective is to enable businesses to achieve their security goals. Trusted by numerous Fortune 1000 organizations, ReliaQuest supports risk management and initiative acceleration. It maintains a significant international footprint as a privately held entity headquartered in Tampa, Florida.

Read More