News & Updates

IBM acquires Polar Security, bolstering data security capabilities

IBM has purchased application security startup Polar Security, in an attempt to address the security of application data in the cloud and help organizations track vulnerable information.

In a statement issued this morning, IBM said that the increased cloud adoption driven by the pandemic has strained organizational capacity to track certain aspects of their application frameworks, including certain types of app data, permissions and more. The company said that this has led to “shadow data,” which isn’t being actively tracked, as well as siloing of information.

The company called Polar a pioneer of “data security posture management,” which focuses on discovery and organization of sensitive information — the idea is identify where sensitive data is stored and what it’s being used for, as well as identifying potential issues in security policy, data usage and configurations.

To read this article in full, please click here

News & Updates

Researchers show ways to abuse Microsoft Teams accounts for lateral movement

With organizations increasingly adopting cloud-based services and applications, especially collaboration tools, attackers have pivoted their attacks as well. Microsoft services consistently rank at the top of statistics when it comes to malicious sign-in attempts, and Microsoft Teams is one application that recently seems to have attracted attackers’ interest.

Researchers from security firm Proofpoint investigated how attackers could abuse access to a Teams account and found some interesting attack vectors that could allow hackers to move laterally by launching further phishing attacks or getting users to download malicious files.

“Our analysis of past attacks and ongoing trends within the dynamic cloud threat landscape indicates that attackers progressively pivot to more advanced attack vectors,” the Proofpoint researchers said in their report. “The adoption of new attack techniques and tools, when combined with apparent security flaws, including dangerous functionalities in first-party apps, exposes organizations to a variety of critical risks.”

To read this article in full, please click here

News & Updates

Monitoring the dark web to identify threats to energy sector organizations

Searchlight Cyber researchers warn of threat actors that are offering on the dark web access to energy sector organizations. Dark web intelligence firm Searchlight Cyber published a report that analyzes how threat actors in the dark web prepare their malicious operations against energy organizations. The threat actors use the hidden part of the web to […]

The post Monitoring the dark web to identify threats to energy sector organizations appeared first on Security Affairs.

Exit mobile version