Cybersecurity News & Analysis | SC Media | Info Security News

Security News

CounterCraft Cyber Deception Platform 2.3.0

CounterCraft’s Cyber Deception Platform is a full spectrum deception solution that takes the design, deployment and management of deception to the next level with real-time attack detection and targeted, actionable threat intelligence directly applicable to the host network. This solution has a full rest API. We saw a ton of changes CounterCraft has made over…

Illusive Networks Deception Management System V3.1.105

Illusive Networks Deception Management System stops attacks by disrupting the human-decision making process behind lateral movement through proactively hardening the network by removing excess credentials, connections and pathways to critical assets. It detects attackers early on by planting fake data on endpoints that trigger alerts. The solution simplifies the incident response process by compiling real-time…

PacketViper Deception360 version 5.0

PacketViper is an active, agentless deception solution that combines internal deception with active, exterior-facing artifacts. It takes action early in the kill chain to detect, prevent and respond to threats automatically without the need for complex orchestrations. Decoys are lightweight, software-based and easily deployed. Internal decoys sit laterally within the network and yield virtually zero…

Smokescreen Technologies IllusionBLACK 3.7

Smokescreen Technologies IllusionBLACK accurately and efficiently detects targeted threats in real time. IllusionBlack creates decoys deployed in the network alongside legitimate assets. For attackers who have reached the point of breach, there is no way to differentiate decoys from reality. Interacting with a decoy raises a silent alarm while systems begin collecting information on an…

August product reviews: Deception network tools

This month, SC Labs takes another look at deception network tools. With the rapid developments and improvements seen in this space, it felt like we were looking at some of these products for the very first time. Deception network tools implement machine learning technology that studies an environment and accompanying assets to create decoy assets,…

Cisco issues multiple product updates, fixes critical flaws in small business switches

Cisco Systems issued a series of security updates on Aug. 6 and 7, in the process disclosing 26 vulnerabilities, including two critical ones found in its Small Business 220 Series Smart Switches. The two most serious bugs consist of a remote code execution flaw (CVE-2019-1913) and an authentication bypass vulnerability (CVE-2019-1912) in the aforementioned switches,…

Security in 2015: Biometrics

BioStar 2 database leaked one million fingerprints, facial recognition data

A breach in a database of biometric security smart lock platform Suprema BioStar 2 exposed more than one million fingerprint records as well as facial recognition information and other sensitive data. The web-based system is used by the likes of the U.K. Metropolitan Police to control access to physical facilities and manage users permissions. Researchers…

Creating a next-gen cybersecurity roadmap

As many of today’s enterprises are struggling to get their arms around cybersecurity, our world has seen an explosion in the number of solutions, providers and recommended steps to take to secure a company’s environment and protect it against cyber incidents.  With so many options and no standardized solution, it is difficult to know where…

BlueKeep-like RCE flaws in RDP among 93 vulnerabilities patched by Microsoft

Microsoft patched 93 vulnerabilities, including two BlueKeep-like remote code execution (RCE) flaws. The two flaws, CVE-2019-1181 and CVE-2019-1182, in Remote Desktop Services, are “wormable,” Simon Pope, director of incident response at the Microsoft Security Response Center (MSRC), wrote in a blog post, “meaning that any future malware that exploits these could propagate from vulnerable computer to vulnerable computer without…

Adapting the classical art of penetration testing to the cubist world of cloud

Many technical practitioners may believe that, at the end of the day, penetration testing is penetration testing. Proper penetration testing, however, is an art that must adapt over time. As an artist’s tools, materials, and media evolve, art evolves. With this evolution in “technology, techniques and approaches must change as well. Our “IT medium” has…

Next post in Executive Insight