** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.
Daily Archives: August 3, 2022
Thoma Bravo snares Ping Identity in $2.8 billion go-private deal
In the latest move in a series of security-company acquisitions, private equity firm Thoma Bravo announced Wednesday that it has reached an arrangement to acquire IAM (identity and access management) firm Ping for a total sale price of $2.8 billion.
Ping Identity’s flagship product is its PingOne Cloud Platform, which acts as an underlying framework to orchestrate the company’s own security products for each step of the identity management process, as well as a way to centrally manage third-party identity solutions.
Thoma Bravo partner Seth Boro said in the announcement that Ping’s products make it well-suited to address the fast-changing needs of companies using identity management technology.
Large-Scale Phishing Attacks Targeting Microsoft Enterprise Email Services
Most of the targeted organizations were located in the US, UK, New Zealand and Australia
Missile Maker MBDA Refutes Hacking Allegations
While some files were indeed stolen, the company says it was not hacked
Qualys adds external attack management capability to cloud security platform
Cloud security and compliance software company Qualys on Wednesday announced it is adding external attack surface management (EASM) capabilities to the Qualys Cloud Platform.
The new capability will be integrated into Qualys CSAM (cybersecurity asset management) 2.0, an inventory monitoring and resolution tool to help security teams gain visibility into previously unknown internet-facing assets.
“Achieving full asset visibility remains one of cybersecurity’s most elusive goals,” said Sumedh Thakar, Qualys CEO, in a press release. ”CyberSecurity Asset Management 2.0 solves this by providing both the holistic, external attacker-level and internal view of the attack surface to address the increased threat landscape comprehensively.”
Ransomware Attacks Taking Toll on Security Professionals
The research took into consideration the responses of 500 IT security decision-makers in US and UK
Securing Your Windows 10 Stand-alone Systems Just Got Easier
We’re excited to announce a draft of CIS Microsoft Windows 10 Stand-alone Benchmark v1.0.0 for all versions of Windows 10.
Drone Deliveries into Prisons
T-Mobile Retailer Guilty of $25m Fraud Scheme
Tips to prevent RDP and other remote attacks on Microsoft networks
One long-favored way that ransomware enters your system is through Microsoft’s Remote Desktop Protocol (RDP) attacks. Years ago when we used Microsoft’s Terminal Services (from which RDP evolved) for shared remote access inside or outside of an office, attackers would use a tool called TSGrinder. It would first review a network for Terminal Services traffic on port 3389. Then attackers would use tools to guess the password to gain network access. They would go after administrator accounts first. Even if we changed the administrator account name or moved the Terminal Services protocol to another port, attackers would often sniff the TCP/IP traffic and identify where it was moved to.