A new never-before-seen Linux malware has been tracked by researchers. The flaw is being tracked as Lightning Framework. More: - This security flaw went untracked for a long time, while researchers claim that it has multiple features.
- The malware's module can fingerprint devices, run shell commands, upload files to the C2 server, write arbitrary data to files, and remove its traces from the infected device after gaining remote access control.
- Linux has been targeted by hackers numerous times this year, as bugs such as BPFDOOR, Symbiote, Syslogk, OrBit, etc.
| |
Hackers are targeting cryptocurrency and commodities trading platforms with the Evilnum malware. The threat actors are targeting companies located in Europe. More: - The main targets are organizations that are involved with foreign currencies, decentralized finance, and cryptocurrencies.
- Evilnum is malware that can steal data from the victims, leading hackers to a position where they control infection paths in the breached devices.
- The hacker group is using infected Microsoft Word documents as a threat vector to breach its victims. The group regularly changes its methods.
- Previous Evilnum attacks have used ZIP files, Onedrive links, and other applications as a threat vector.
| |
A message from LAIKA If you’re trying to close deals, SOC 2 is probably a thorn in your side. What is it, and who cares? Your business needs SOC 2. But building compliance from scratch is complicated, time-consuming, and the cost can be crippling. Laika has you covered. Uncomplicate SOC 2 with our guide for growth-minded founders. In the guide by Laika you’ll learn: - What is SOC 2 compliance and why it matters for your startup
- How to close more deals faster by becoming SOC 2 compliant
- How to prepare for SOC 2 compliance
- What to expect in terms of time and cost
- What to do after the report is in
What makes Laika the authority on SOC 2? They’re the only compliance automation solution that was built by compliance experts. Learn how to turn compliance from a pain point into a secret edge over your competitors. Download Now | |
New York will provide resources to strengthen local cybersecurity capabilities. The state of New York will donate over $30M to its local authorities as part of the initiative. More: - The news was announced by Gov. Kathy Hochul, adding that this initiative will strengthen security for New York's citizens and institutions.
- All of the counties in New York will receive benefits from a shared security plan, something that officials from Homeland Security believe is the key to having a well-equipped cyber defense.
- Initially, the program is being launched in Albany, Buffalo, Syracuse, Rochester, and Yonkers.
- One of the services provided to the counties is a free CrowdStrike license, which will help them identify cyber threats.
| |
Anvilogic has raised $25M in a Series B funding round. The funding was led by Neuberger Berman with participation from Xerox Ventures, G Squared, Foundation Capital, Point72 Ventures, and Cervin Ventures. More: - Anvilogic aims to automate the manual parts of SOC teams that are responsible for identifying flaws and mitigating cybersecurity attacks within companies and organizations.
- The company has developed a platform that notifies SOC teams when they are missing an essential piece of information that may lead to discovering a potential flaw.
- This platform also compiles analytics that companies can utilize to understand precisely how their SOC staff is responding to threats. The platform also offers a scoring system.
- Anvilogic is integrated with Snowflake, enabling its users to offload their security data to the cloud company and reduce costs by 50%. Anvilogic has PayPal,eBay, and Rubrik.Inc as some of its clients.
| |
A message from COX EDGE Assets are getting larger, and end users have you stuck between the cloud and a hard place. While today’s websites and apps are still largely run out of one location, your users are everywhere. Cox Edge’s CDN steps in to help you deliver content more efficiently. Our extensive network of POPs delivers content to your end users based on location, co-locating site and app assets closer to where your users are. Learn how Cox Edge’s CDN can help you: - Quickly scale up during heavy traffic
- Decrease costs
- Deliver an enhanced experience to end users with faster load times
- Increased performance more stability
Get started | |
Data protection startup Sotero has raised $8M as part of its extended seed round. The startup offers a platform that aims to defend data from threat actors at all times without interruption. More: - Sotero uses Machine Learning to simultaneously analyze if any outside actors are trying to illegally access data while protecting this data's anonymity.
- The company claims that it is differentiated by the fact that its product can protect all kinds of data and that it can do so even when that data is being used and only when it is passive.
- The funding round was led by OurCrowd with participation from Gutbrain Ventures, PBJ Capital, and Boston Seed Capital.
| |
Quick Hits - The right metrics make a difference. Read our fact sheet and learn what you should be measuring to prove marketing impact.*
- Google and Microsoft are industry leaders in Mergers and Acquisitions in cybersecurity, leading most of the 40 deals made per day during the end-of-year period in 2021.
- Industrial cybersecurity will be worth over $42B by 2029, according to a new report.
- Google Cloud has partnered with the Health Information Sharing and Analysis Center to advance patient data protection from future threat actors. The company will also invest $10B for this cause, as the funds will be deployed in a period of only five years.
- China's cyberspace regulation authority has fined Didi Global $1.2B. The reason stated for the fine is that the company has allegedly breached national data security laws, privacy laws, and cybersecurity laws.
- A Chrome bug is being used to target and breach journalists. The bug is a zero-day vulnerability, while the tool used to hack the victims is the Candiru spyware.
- See how to make sense of the security industry's infamous "alphabet soup" of acronyms and complex technical tools.*
*This is a sponsored post. | |
Upcoming events at Inside: | |
| | Arbër is an Inside writer who also has experience in entrepreneurship. He has experience covering Consumer Tech, Venture Capital, NFTs, Crypto, etc. Arbër holds a Bachelor's degree in Business from XAMK University in Finland. When he is not reading(and writing) business news, he chooses to watch sports or anime...and then read news about sports or anime. | | Editor | Aaron Crutchfield is based in the high desert of California. Over the last two decades, he has spent time writing and editing at various local newspapers and defense contractors in California. When he's not working, he can often be found looking at the latest memes with his kids or working on his 1962 Ford. | |
Laika is a unified compliance platform that automates workflows for audits, infosec monitoring, and vendor due diligence in a single, collaborative space. | |
Cox Edge’s CDN — Exceed user expectations and streamline content delivery. | |