Cybercriminals Reportedly Created Blockchain Analytics Tool

Data Breach Today

Researchers Say the Tool Is Designed To Help Gangs Launder Bitcoin Cybercriminals have developed a blockchain analytics tool on the darknet that could help a gang launder illegally obtained bitcoin, and they are actively marketing it, according to the cryptocurrency analytics firm Elliptic.

APTs Using New Tools to Target ICS/SCADA

Data Breach Today

government agencies, including the Department of Energy, CISA, the NSA and the FBI issued a joint cybersecurity advisory about advanced persistent threat actors using new tools and malwares to target industrial control systems and supervisory control and data acquisition devices


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

9 Best Penetration Testing Tools for 2022

eSecurity Planet

Pen tests are often performed by third parties, but as these outside tests can be expensive and become dated quickly, many organizations perform their own tests with pen testing tools, using their own IT personnel for their red teams (attackers). 10 Top Open Source Penetration Testing Tools.

Top Deception Tools for 2022

eSecurity Planet

If an attacker is spending time and energy breaking into a decoy server, the defender is not only protecting valuable assets, but also learning about the attacker’s objectives, tools, tactics, and procedures. That is the basic premise behind deception tools and technologies.

Prioritizing Customer Experience Using SLIs & SLOs: A Case Study from The Telegraph

Service Level Indicators (SLIs) and Service Level Objectives (SLOs) are a key pillar of Site Reliability Engineering (SRE) and are the principal tool for eliminating needless alerts and focusing on what really matters to the business.

Top Open Source Security Tools

eSecurity Planet

This has given rise to a large number of open source security tools. However, the tools themselves vary considerably in scope, sophistication, and function. The editors of eSecurity Planet find the following 20 open source security tools to be particularly useful.

CISA Releases CHIRP, a Tool to Detect SolarWinds Malicious Activity

Security Affairs

US CISA has released a new tool that allows detecting malicious activity associated with the SolarWinds hackers in compromised on-premises enterprise environments. ” reads the description provided on GitHub for the tool.

Cloud 114

Fraudsters Flooding Collaboration Tools With Malware

Data Breach Today

Cisco Talos: Reliance on These Tools Expands Attack Surface The increasing reliance on collaboration tools such as Slack and Discord to support those working remotely during the COVID-19 pandemic has opened up new ways for fraudsters and cybercriminals to bypass security tools and deliver malware, Cisco Talos reports.

10 Top Active Directory Security Tools for 2022

eSecurity Planet

Microsoft’s identity and access management tools dominate the enterprise market, with more than a 50% market share between Active Directory (AD) for Windows and Azure servers. AD auditing tools check the health of AD users, groups, units, activity, and settings.

Signal Founder Says Cellebrite's Forensics Tools Flawed

Data Breach Today

Flaws Described by Moxie Marlinspike Raise Questions About Extracted Data's Trustworthiness Law enforcement agencies use forensics tools from Israeli company Cellebrite to gain access to locked mobile devices and extract data.

How to Overcome the Pain Points of Your CRM

CRM software is a powerful tool when used correctly, yet another obstacle to a sales team’s efficiency when it’s not. Leveraging research and commentary from industry analysts, this eBook explores how your sales team can get back valuable time by overcoming some pain points with your CRM, such as low adoption rates, integrations, and data quality.

Productivity Tools May Be Monitoring Workers' Productivity

Data Breach Today

Regulatory and Employee Litigation Risks Face Businesses That Violate Privacy Rules Warning to workers: Your productivity tools may also be tracking your workplace productivity, and your bosses may not even know it.

Tapping Public Health Research Tools to Fight Cybercrime

Data Breach Today

Tools and methodologies that have been helpful for global public health research might also provide better understanding of the root causes of cybercrime and the motivation of cybercriminals, especially as such crime has surged during the COVID-19 pandemic, says Stanley Mierzwa of Kean University

Top 10 Open Source Vulnerability Assessment Tools

eSecurity Planet

Vulnerability assessment tools usually scan applications for known vulnerabilities. Some of the tools we’ll see in this top 10 list are bundled in Kali Linux , a super-charged security distribution that can run both pentests and vulnerability tests. Vulnerability scanning tools.

Risk 76

Chinese Hacking Group 'Cloned' NSA Exploit Tool

Data Breach Today

Researchers: 'Jian' Hacking Tool Targeted Zero-Day Flaw in Windows A Chinese hacking group reportedly "cloned" and deployed a zero-day exploit developed by the NSA's Equation Group before Microsoft patched the Windows flaw being exploited, according to Check Point Research.

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

CISA compiled a list of free cybersecurity tools and services

Security Affairs

CISA has created a list of free cybersecurity tools and services that can help organizations increase their resilience. The list includes open source tools and free resources provided by government organizations and private cybersecurity firms. The U.S.

Siemens Patches 21 Vulnerabilities in 2 Tools

Data Breach Today

Flaws, If Exploited, Could Enable Remote Control, Data Exfiltration Siemens has mitigated 21 vulnerabilities in two of its virtualization software tools that, if exploited, could enable attackers to gain remote control, exfiltrate data or cause systems to crash.

Free Cybersecurity Tools Offered to Hospitals and Utilities

Data Breach Today

US Cracks Down on Sale of Offensive Cybersecurity Tools

Data Breach Today

Tools Used for Personal Surveillance, Malicious Activities Must Be Licensed The U.S.

Sales 228

Catch Them If You Can: The Passive Candidates Edition

With the right tools and mindset, it’s possible to track down this candidate (and many others like them!). How? Simple: By thinking like one. To get started on your search, we’ve gathered clues you’ll need to get in the mind of your passive prospects.

Updated Trickbot Deploys Fresh Reconnaissance Tool

Data Breach Today

Report: Botnet Now Capable of Exfiltrating Additional Data From Networks The operators behind the Trickbot malware are deploying a new reconnaissance tool dubbed "Masrv" to exfiltrate additional data from targeted networks, according to a Kryptos Logic report.

CISA Tool Helps Measure Readiness to Thwart Ransomware

Data Breach Today

Tool Designed to Gauge Whether Organizations Have Adequate Defense, Recovery Measures The U.S. Cybersecurity and Infrastructure Security Agency has released a Ransomware Readiness Assessment audit tool to help organizations size up their ability to defend against and recover from attacks

Tetris: Chinese Espionage Tool

Schneier on Security

I’m starting to see writings about a Chinese espionage tool that exploits website vulnerabilities to try and identify Chinese dissidents. Uncategorized China cyberespionage espionage spyware

Free Tool Helps Hospitals Block Ransomware

Data Breach Today

To help strengthen the healthcare sector's defenses, the Center for Internet Security is offering all U.S. hospitals and healthcare delivery systems a free protection service designed to help block ransomware and other malware, says Ed Mattison, the center's executive vice president

Detect and Respond to Threats Across Your Applications, Networks, and Infrastructure

Understand how to solve cloud complexity challenges with threat detection tools, analyze security threats anywhere in your stack, and deploy turnkey detection rules mapped to the MITRE ATT&CK framework with Datadog Security Monitoring.

Best DevSecOps Tools

eSecurity Planet

The growth of DevSecOps tools is an encouraging sign that software and application service providers are increasingly integrating security into the software development lifecycle (SDLC). Best DevSecOps Tools. Best Open Source or Free DevSecOps Tools. What are DevSecOps Tools?

Cloud 79

Top Code Debugging and Code Security Tools

eSecurity Planet

Code debugging and code security tools exist to find and help developers fix the problems that occur. Such tools typically capture exceptions as they occur and provide diagnostic and contextual data to make resolution easier. How they go about it differs from tool to tool.

How WastedLocker Evades Anti-Ransomware Tools

Data Breach Today

Sophos Says Malware Designed to Avoid Security Measures WastedLocker, a ransomware strain that reportedly shut down Garmin's operations for several days in July, is designed to avoid security tools within infected devices, according to a technical analysis from Sophos

Kaseya Obtains Decryption Tool After REvil Ransomware Hit

Data Breach Today

Software Vendor Said Approximately 60 MSPs and 1,500 Clients Affected by Attack Remote management software vendor Kaseya has obtained a decryption tool for all organizations affected by the massive ransomware attack launched via its software.

The 5 Stages of Account-Based Marketing — and How to Win Them All

Successfully complete the five stages of ABM: define, identify, engage, convert, and connect. We’ll show you how to create a unified system with your sales team to help them land more qualified opportunities and connect with prospects like never before.

Chinese Attack Tool Gains Gmail Access

Data Breach Today

Campaign Targets Tibetan Organizations Proofpoint reports that Chinese state-sponsored hackers are using a new customized malicious Mozilla Firefox browser extension that facilitates access and control of victims’ Gmail accounts. So far, the hackers are targeting Tibetan organizations

Access 270

US NCSC and DoS share best practices against surveillance tools

Security Affairs

The US NCSC and the Department of State published joint guidance on defending against attacks using commercial surveillance tools. Surveillance tools can be used to record audio, including phone calls, track the phone’s location, and access and retrieve all content on a phone (i.e.

Sales 109

Additional Hacking Tools Tied to North Korean-Linked Group

Data Breach Today

Cybereason Finds Kimsuky Group Using Fresh Spying Tools, Infrastructure Researchers with Cybereason have uncovered a fresh set of malicious tools tied to a North Korean-linked hacking group called Kimsuky, according to a recent analysis.

NSA Releases Guidance on Obsolete Encryption Tools

Data Breach Today

Agency Recommends Replacement of Old TLS and SSL Protocols The U.S. National Security Agency has released guidance on how the Defense Department, other federal agencies and the contractors that support them should replace obsolete encryption protocols that can enable cyber intrusions.

The Power of Conversation Intelligence

This eBook will answer all your questions and more on Conversation Intelligence (CI) by providing a complete overview and its need in Revenue organizations - delivering impact from your Sales Development Representatives all the way to the C-Suite.

Best Digital Forensics Tools & Software for 2021

eSecurity Planet

Since the inception of data forensics almost forty years ago, methods for investigating security events have given way to a market of vendors and tools offering digital forensics software (DFS). Best Digital Forensics Software Tools of 2021.

EU Launches Decryption Tool for Law Enforcement

Data Breach Today

Move Seen as Alternative to Weakening Encryption Europol, the European Union's law enforcement agency, and the European Commission are launching a new decryption platform to help law enforcement agencies decrypt data that has been obtained as part of a criminal investigation, a move seen as an alternative to weakening encryption.

Hackers Use Cloud Monitoring Tool to Install Cryptominers

Data Breach Today

Reports: TeamTNT Using Weave Scope Tool to Target Cloud Platforms TeamTNT, a recently uncovered hacking group, is weaponizing Weave Scope, a legitimate cloud monitoring tool, to help install cryptominers in cloud environments, according to reports from Intezer and Microsoft

Cloud 242

Microsoft Issues Mitigation Tool for an Exchange Server Flaw

Data Breach Today

One-Click Mitigation Tool' Provides Quick Fix for Proxy Logo Exchange Flaw Microsoft has released an interim mitigation tool designed to help smaller organizations take quick action to prevent attacks that exploit the unpatched Proxy Logon flaw in on-premises Microsoft Exchange servers

Reaching Unreachable Candidates

Speaker: Patrick Dempsey and Andrew Erpelding of ZoomInfo

What is ZoomInfo for Recruiters? Find and connect with the right talent to fill roles fast with more data, basic search, advanced search, candidate and company profiles, and export results. Watch this On-Demand Webinar today to see how ZoomInfo for Recruiters can work to get your talented candidates results.