In Other News: Palo Alto Loses Patent Lawsuit, Identity Firms Get Funding, Government Hackers

SecurityWeek's cybersecurity roundup provides a concise compilation of noteworthy stories that might have slipped under the radar.
Each week, we curate and present a collection of noteworthy developments, ranging from the latest vulnerability discoveries and emerging attack techniques to significant policy changes and industry reports.
Recorded Future reveals how four Iranian intelligence and military contractors linked to the Islamic Revolutionary Guard Corps have been engaging with cyber contracting parties, creating a network of organizations in aid of Iranian state-sponsored threat actors' targeting of government, media, critical infrastructure, and other entities in Western countries.
Russia-linked APT group Shuckworm has been observed targeting the Ukrainian military with a new PowerShell backdoor called Subtle-Paws.
The observed attacks, which are part of the Steady#Ursa campaign, also involved lateral movement through infected USB drives.
APT28 brute-forcing government networks for 20 months.
For roughly four years, a financially motivated threat actor tracked as UNC4990 has been relying on weaponized USB drives to infect victims with malware, Mandiant reports.
The threat actor has been hosting its malicious payloads on popular websites, such as Ars Technica, GitHub, GitLab, and Vimeo.
Palo Alto Networks ordered to pay $151.5 million to Centripetal Networks.
Palo Alto Networks was ordered to pay Centripetal Networks $151.5 million, after a jury found the cybersecurity firm infringed on several patents.
Palo Alto disagrees with the decision and plans to seek relief from the court.
Location identity solutions provider Incognia has raised $31 million in Series B funding for its global expansion.
The company's technology can help prevent account takeovers and fake account creation.
Oasis Security has raised $40 million in funding for its non-human identity management solutions to help organizations automate the lifecycle of non-human identities, which can include service accounts, secrets, API keys, tokens and certificates.
UN Cybercrime Treaty endangers human rights, EFF warns.
Patches released for Chrome, Mastodon, Splunk, and WordPress address critical- and high-severity vulnerabilities that could lead to account takeover, remote code execution, and information disclosure.
Check Point announced the preview launch of Infinity AI Copilot, a product that leverages AI and cloud technologies to help organizations automate complex security tasks and provide proactive solutions to threats.
Twice as many vulnerabilities in WordPress were documented in 2023 compared to 2022, Defiant's Wordfence team says in an annual report.
Cross-site scripting, cross-site request forgery, missing authentication/authorization bypass, SQL injection, and information disclosure were the top five most common types of vulnerabilities.
Malware infections remained at the same level, credential stuffing attacks dropped, while XSS attacks surged.


This Cyber News was published on www.securityweek.com. Publication date: Sat, 03 Feb 2024 11:43:05 +0000


Cyber News related to In Other News: Palo Alto Loses Patent Lawsuit, Identity Firms Get Funding, Government Hackers

Palo Alto Networks and IBM to Jointly Provide AI-Powered Security Offerings - PRESS RELEASE. SANTA CLARA, Calif. and ARMONK, N.Y., May 15, 2024 /PRNewswire/ - Palo Alto Networks, the global cybersecurity leader, and IBM, a leading provider of hybrid cloud and AI, today announced a broad-reaching partnership to deliver ...
1 month ago Darkreading.com
Congress Must Stop Pushing Bills That Will Benefit Patent Trolls - The U.S. Senate is moving forward with two bills that would enrich patent trolls, patent system insiders, and a few large companies that rely on flimsy patents, at the expense of everyone else. One bill, the Patent Eligibility Restoration Act would ...
3 months ago Eff.org
How To Fight Bad Patents: 2023 Year In Review - EFF's longstanding project of fighting for a more balanced, just patent system has always borne free expression in mind. Patent trolls, who simply use intellectual property rights to extract money from others, continue to be a barrier to people who ...
6 months ago Eff.org
Law Firms and Legal Departments Get Singled Out For Cyberattacks - Cyberattackers are doubling down on their attacks against law firms and corporate legal departments, moving beyond their historical activity of hacking and leaking secrets to targeting the sector with financial attacks, such as ransomware and ...
7 months ago Darkreading.com
In Other News: Palo Alto Loses Patent Lawsuit, Identity Firms Get Funding, Government Hackers - SecurityWeek's cybersecurity roundup provides a concise compilation of noteworthy stories that might have slipped under the radar. Each week, we curate and present a collection of noteworthy developments, ranging from the latest vulnerability ...
5 months ago Securityweek.com
How Cybersecurity for Law Firms has Changed - The public nature of the legal system makes law firms particularly vulnerable to a growing number of cybersecurity risks. Law firms have unique access to highly confidential client information and as a result, face a growing number of federal, ...
6 months ago Securityboulevard.com
Research Shows 163% ROI with Palo Alto Networks Software Firewalls - Good news is here for cloud and network security professionals who need proven, cost-effective solutions that substantially reduce downtime and breaches across a range of cloud and virtualized environments. Palo Alto Networks software firewalls not ...
6 months ago Paloaltonetworks.com
CISOs Grapple With IBM's Unexpected Cybersecurity Software Exit - IBM's surprise departure from cybersecurity software this week didn't just rearrange the competitive landscape - it also reshuffled the procurement plans and vendor relationships for many CISOs rebuilding their SOCs. IBM has agreed to sell the QRadar ...
1 month ago Darkreading.com
Taking the complexity out of identity solutions for hybrid environments: Identity Fabric and orchestration - For the past two decades, businesses have been making significant investments to consolidate their identity and access management platforms and directories to manage user identities in one place. Instead, businesses must learn how to consistently and ...
7 months ago Securityintelligence.com
Providing Optimal Cloud Security Outcomes Through StateRAMP - Palo Alto Networks reaches a significant milestone as our commitment to comprehensive security achieves the largest number of StateRAMP marketplace approved cybersecurity offerings. In its commitment to be the state and local government's ...
3 months ago Paloaltonetworks.com
Palo Alto Networks Completes Acquisition of Talon - Palo Alto Networks announced today that it has completed the acquisition of Talon Cyber Security, an Israeli startup selling a secure browser technology to enterprise customers. Palo Alto first announced plans to buy Talon in November 2023 in a deal ...
6 months ago Securityweek.com
Identity as a Service - Let us introduce Identity as a Service, a revolutionary identity management strategy that aims to improve security, simplify user interfaces, and enable frictionless access to online resources. Organizations can use IDaaS platforms to access identity ...
6 months ago Feeds.dzone.com
SentinelOne vs Palo Alto Cortex XDR: Which Tool is Best? - SentinelOne and Palo Alto are two of the top brands in this space, and this comparison will help you decide if either one of the company's tools is right for you. SentinelOne's Singularity platform offers four subscription tiers that include their ...
1 month ago Techrepublic.com
How Strata Identity and Microsoft Entra ID solve identity challenges in mergers and acquisitions - In particular, there is an immediate and profound impact on the identity and access management postures of both companies. While most combined organizations aspire to eventually consolidate their identity systems, this is a challenging and ...
6 months ago Microsoft.com
How Government Agencies Can Leverage Grants to Shore Up Cybersecurity - COMMENTARY. Since the pandemic forced unprecedented adoption of remote access and delivery of government services, telehealth, and education, cybersecurity has rapidly shot to the top of priority lists for IT leaders. What was once a shiny object ...
1 month ago Darkreading.com
Palo Alto Networks Recognized as a Leader in the 2023 Gartner Magic Quadrant for Endpoint Protection Platforms - Today, we are pleased to announce that Palo Alto Networks has been named a Leader in the 2023 Gartner Magic Quadrant for Endpoint Protection Platforms. Before we dive into the significance of this year's Magic Quadrant for EPP, I want to take a ...
5 months ago Paloaltonetworks.com
Unlocking the Economic Benefit of NGFWs - Cyberthreats are increasing in volume and complexity, making it difficult for network defenders to protect their organizations. Threat actors are evolving their tools and techniques, finding new ways to employ artificial intelligence to avoid ...
3 months ago Paloaltonetworks.com
Exploit released for Palo Alto PAN-OS bug used in attacks, patch now - Exploit code is now available for a maximum severity and actively exploited vulnerability in Palo Alto Networks' PAN-OS firewall software. Tracked as CVE-2024-3400, this security flaw can let unauthenticated threat actors execute arbitrary code as ...
2 months ago Bleepingcomputer.com
The Latest Identity Theft Methods: Essential Protection Strategies Revealed - Identity theft has evolved far beyond the days of stolen mail and dumpster diving. Today's identity thieves employ sophisticated techniques, including account takeovers and government benefit fraud, making it essential for you to stay vigilant to ...
5 months ago Hackread.com
1Kosmos Unifies Identity Verification User Journeys Across Web and Mobile Platforms - PRESS RELEASE. EAST BRUNSWICK, N.J., Nov. 29, 2023 - 1Kosmos, the company that unifies identity proofing and passwordless authentication, today announced the 1Kosmos BlockID platform now enables organizations to seamlessly extend web-based identity ...
7 months ago Darkreading.com
What is identity management? Definition from SearchSecurity - Identity management is the organizational process for ensuring individuals have the appropriate access to technology resources. Identity management is an essential component of security. Identity management includes authenticating users and ...
2 months ago Techtarget.com
What is Azure Identity Protection and 7 Steps to a Seamless Setup - As a result, tools such as Microsoft's Azure Identity Protection have become a staple in protecting against compromised identities, account takeover, and misuse of privileges. Azure Identity Protection is a security service that provides a robust ...
1 month ago Securityboulevard.com
Judge Overturns Centripetal Patent Fine Against Cisco - Networking giant Cisco defeats $2.75bn patent ruling for Centripetal Networks, after five years of courtroom battles. Cisco Systems has this week achieved a notable outcome in its five year legal battle with cybersecurity company Centripetal ...
6 months ago Silicon.co.uk
Cybersecurity Deals Boom as Investment Dips, Pinpoint Reports - The cybersecurity sector recorded 346 funding rounds and 91 mergers and acquisition transactions in 2023, according to cyber recruitment firm Pinpoint Search Group. This equals 437 cyber deals in total and a 40% increase from 2022, which saw 303 ...
5 months ago Infosecurity-magazine.com
New York Times Sues Microsoft, OpenAI AI Training - The New York Times has sued both OpenAI and Microsoft, alleging copyright infringement of its news content. The NYT said it is the first major US media organisation to sue OpenAI, the creator of the popular AI chatbot ChatGPT. The lawsuit, filed in ...
6 months ago Silicon.co.uk

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)