In-brief: Managed DNS firm Dyn, a victim of the Mirai botnet, got its revenge: taking part in a coordinated takedown of WireX, a botnet of compromised Android devices, according to an announcement Monday.
In-brief: Russian hackers aren’t the biggest threat to the security and integrity of elections says Bev Harris of Black Box Voting. Instead, it’s a more common enemy: run of the mill political corruption, mostly at the local level. Also: Eric Hodge of CyberScout talks about the challenges of helping states secure their election systems. Problem number one: recalcitrant voting machine makers.
In-brief: more than three years after it was first discovered, the Heartbleed vulnerability in OpenSSL continues to plague organizations worldwide. Why has it been so hard to fix? In this Industry Perspective, Patrick Carey of the firm Black Duck talks about some of the complicating factors that make vulnerabilities like Heartbleed so hard to eradicate.
Alternatives to legacy endpoint protection software like anti virus is one of the hottest areas in the information security space. Yesterday’s announcement by Cybereason of a $100 Million investment by SoftBank only underscores that. Cybereason, which has offices in Boston, London and Tel Aviv, closed a Series D funding round from SoftBank to accelerate growth. The round brings total investment in Cybereason to $189 million and make SoftBank the single largest investor int he company, which also counts Spark Capital, Lockheed Martin and CRV as investors. “We are thrilled with our incredible growth but we are never satisfied because hackers still have a big advantage over the vast majority of corporations. This new funding allows us to increase our growth through new distribution channels and to develop new technologies. Our strengthened partnership with SoftBank, which has a formidable sales force and enterprise customer base in Japan and a global reach, […]
In-brief: One week after the WannaCry ransomware knocked out hospitals in the UK and subway fare systems in Germany, the malware is as notable for who it didn’t affect for who it did. Among those spared WannaCry’s wrath: federal IT systems in the U.S. as well as consumers. But why?