The information security industry needs both better tools to fight adversaries, and more people to do the fighting, says Fortinet Deputy CISO Renee Tarun in this interview with The Security Ledger Podcast’s Paul Roberts.
In-brief: Both Cisco Systems and Fortinet confirmed that vulnerabilities targeted by tools leaked by the previously unknown group Shadow Brokers were real.
We’re used to writing about all the things that are changing in the security field: the onslaught of mobile devices and connected ‘stuff,’ the advent of ‘advanced’ and ‘persistent’ adversaries, the destruction of the network perimeter. But all this talk about change can obscure the fact that so much has not changed. Companies still maintain perimeters, after all, and they rely on nuts-and-bolts technologies to defend them. But these days, those products need to do more – especially in the area of ‘advanced threats’ that are likely to slip past traditional antivirus and IDS products. Enter Cisco Systems, which on Tuesday announced a new version of its ‘next generation firewall‘: the Cisco ASA (Adaptive Security Appliance) with FirePOWER Services. The appliance is the first to make full use of technology from Cisco’s acquisition of Sourcefire last year. Specifically, the latest ASA integrates Sourcefire’s Advanced Malware Protection (or AMP) technology, which gives the […]
As the saying goes: “If the van’s a DoS’in, don’t come a knock’in.” Or something like that. Alas, for a man believed to be the controversial owner of the Dutch bulletproof hosting firm Cyberbunker, the authorities did “come a knock’in,” arresting the individual who is believed to be responsible for the world’s largest distributed denial of service (DDoS) attack. In a statement on Sunday, the Spanish Ministry of the Interior released a statement saying that National Police agents arrested the man responsible for the attacks in response to a European arrest warrant stemming from an investigation begun by Dutch authorities. The suspect was not named, but was described as a 35 year-old from Alkmaar (Netherlands) who was apprehended while traveling in a van equipped with computer equipment and a range of antennas and used as a mobile office. The man is believed to be Sven Kamphuis, the owner and manager of Dutch hosting firm […]
A researcher who has studied the malicious software used in the attacks on media outlets and banks in South Korea this week said the attacks were coordinated, but messy and loud, without many of the hallmarks of a state sponsored hacking operation. Richard Henderson, a Security Strategist at Fortilabs at Fortinet Inc. said that the malware used in the attack was programmed to begin operating at 2:00pm local time, suggesting that those behind it had planned their operation for weeks or months before launching it. Still, Henderson said many details of the attack make it dissimilar from so-called “advanced persistent threat” or APT-style hacks that are carried out by foreign governments or groups working on their behalf. Henderson said that Fortinet analysts first obtained a copy of the malware on March 19, a day before the attacks. Researchers there had already identified the “time bomb” hidden in the code, which was […]