Tools News, Articles and Updates

Turla cyber-espionage group switched to open-source malware

The Turla cyber-espionage group has implemented some new tactics over the last few months incorporating some open-source exploitation tools instead of relying solely on their own creations to run campaigns.

May 2018 Product Reviews: SIEM and UTM-NGFW

All the tools reviewed allow organisations to collect, sift through and interact with the mounds of information and events generated by networks and devices, says technical writer Dan Cure.

Microsoft adds ransomware protection, recovery tools to Office 365

Microsoft has rolled out a series of new tools to protect its Office 365 Home and 365 Personal customers from a variety of cyber-threats, including ransomware.

Sophisticated hacking tools now in the hands of petty cyber-criminals

Sophisticated hacking tools and techniques like watering-hole attacks, once used only by nation states or proxies, now increasingly used by criminal hackers, fueling concerns that state-sponsored hackers may have gone rogue.

Data disaster! What are your IP priorities? Ensuring staff are equipped

It is vital to ensure that employees are aware of and educated about a company's implemented security policy, know the best practice means of transmission and storage of corporate data, and have the tools they need to do their jobs.

IT security for SMEs in 2018 - information overload

SMEs in particular, face a significant challenge to correlate the output from various systems and interfaces. It is therefore important that the right tools are chosen to empower SMEs to meet these challenges says David Feldman.

McAfee CEO calls for rethink on cyber-security talent shortage

It's not a talent shortage problem, more a "talent efficiency opportunity". Also Skyhigh purchase announced.

How threat intelligence can help you best utilise your security budget

SOC analysts are becoming buried in more security data every day and, without the right tools, identifying critical security insights and making the right recommendations in an efficient or effective manner is next to impossible.

How secure are you? And are your current tools up to the job?

Con Mallon advises, conduct a compromise assessment based on the assumption that you've already been compromised, then pick the right tools, processes, technology and intelligence to combat that threat.

The minimum you need to do before GDPR goes live: 4 stages to compliance

GDPR: It's important to put data intelligence tools in place that will allow you not only to conduct an audit of the data you have collected in the past but also address compliance in the future says Rob Perry.

News Feature: Google Security interview "human solutions - the way to go."

Google has launched of a range of personal and corporate security enhancements (below) this month. Google security expert Allison Miller, spoke to SC about the organisation's approach to security and privacy concerns.

Cooperative development speeds Nato cyber-intelligence-sharing

NATO and partner countries are sharing R&D in the development of cyber-security tools to achieve economies of scale, including the CIICS (Cyber Information and Incident Coordination System).

As CISOs look for more clarity in the noise, is the cloud the answer?

Despite its security issues, security vendors appear to be migrating security tools to the cloud to provide the answer to CISOs wanting a clearer approach to quicker threat detection and prevention.

Secret key-finding tool launched

TruffleHog could be used to search for secret keys used to access servers

Second Shadow Brokers dump released

The hacking group named The Shadow Brokers has released more NSA-related files, these are said to show IP addresses linked to the Equation Group, a hacking group believed to be an NSA contractor.