Newsletter |
|||||||
March 29th, 2017 | |||||||
Quarterly Update Invitation |
|||||||
Change Tracker Gen7 provides the most accurate and effective File Integrity Monitoring solution, ensuring the integrity of your security IT systems and reporting any changes as they take place. But how do you differentiate between ‘good’, intended or planned changes, and ‘bad’, possibly malicious activity? The solution is to leverage Cloud-Based Threat Intelligence and automatically authorize file changes as they are detected using the world’s largest authoritative file whitelist. And now you can do just that, using the NNT FAST Cloud (File Approved-Safe Technology). NNT is excited to invite you to join us for our upcoming Quarterly Update: NNT’s FAST Cloud Integration from NNT’s CEO & CTO. During this session, you’ll hear directly from our CEO, Mark Kerrison, and CTO, Mark Kedgley as they provide a detailed technical overview of our latest feature, NNT FAST Cloud. |
|||||||
Consumer reports to Include cyber security in product reviewsConsumer Reports, a nonprofit organization that conducts non-biased and extensive reviews on cars, appliances, and other consumer goods, is preparing for the inclusion of cybersecurity and privacy safeguards when scoring products. The group said today that it had joined forces with numerous outside organizations to create methodologies for reviewing how easily a product can be hacked and how well customer data is secured. Consumer Reports says they will gradually implement these new methodologies to their review process, starting with test projects that evaluate small numbers of products. |
Confidential messaging app 'confide' riddled with security vulnerabilitiesAccording to security researchers with IOActive and Quarkslab, the popular confidential messaging app called Confide is riddled with security vulnerabilities. Researchers found that this application could allow attackers to leak session information, enumerate users, and access details like emails and phone numbers. In a recent report, IoActive states the apps notification system did not require a valid SSL server certification to communicate, ultimately leaking session information to MiTM attacks. Additionally, the app allowed unencrypted messages to be delivered without ever altering the user. NNT Ranks #54 on Q1 2017 Cybersecurity Ventures Top 500
New Net Technologies (NNT), the industry leader in Change Control Technology, is proud to be ranked #54 on Cybersecurity Ventures’ Cybersecurity 500, a global compilation of leading companies that represent the hottest and most advanced cyber security companies to watch in 2017. NNT, with offices in the U.S. and the U.K. and a leader in Change Control Technology providing real-time contextual File Integrity Monitoring, Continuous Compliance Control and Configuration Drift Management- has jumped up the list from the previous position held in 2016. Rising from #67 in 2016, this advancement is a testament to the company’s latest combination of real-time threat intelligence with forensic breach detection capabilities. |
Modernizing your Cyber security approach with the CISDuring our most recent webinar, we discussed the increased importance of applying the Center for Internet Security Controls to a modern cyber security approach. During this session, NNT highlighted the benefits of combining the CIS standards with ongoing, real-time compliance monitoring. POS Breach Hits select restaurants across the USSelect Restaurants, owner and operator of several upscale eateries found throughout the United States, is the latest victim of a point-of-sale breach. Among the restaurants impacted include: Boston’s Top of the Hub; Parker’s Lighthouse in Long Beach, Calif.; the Rusty Scupper in Baltimore, Md.; Parkers Blue Ash Tavern in Cincinnati; Parkers’ Restaurant & Bar in Downers Grove, Ill.; Winberie’s Restaurant & Bar with locations in Oak Park, Ill. and Princeton and Summit, New Jersey; and Black Powder Tavern in Valley Forge, Pa. Security expert Brian Krebs claims that the likely vector for the hack is Select’s PoS Vendor, 24x7 Hospitality Technology. |
|||||
Study Finds 3,000 Industrial Sites Hit by Non-Targeted Malware a YearResearchers at the industrial cyber security firm Dragos have found that thousands of industrial facilities have their systems infected with common malware every year. As part of a project termed MIMICS (Malware in Modern ICS), Dragos has identified 30,000 samples of malicious ICS files and installers from 2003 to 2017. Non-targeted infections containing viruses like Sivis, Ramnit and Virut are the most common, followed by Trojans that can provide threat actors access to Internet-facing environments. |
|||||||
|