Guardicore Labs is announcing the release of Cyber Threat Intelligence (CTI), a freely available resource to assist security teams in identifying and investigating malicious IP addresses and domains. Our Cyber Threat Intelligence is designed to allow security teams to keep track of potential threats that are specific to data center and cloud infrastructure.
About Ravit Greitser
Ravit is a professional writer with over 15 years experience in writing technical literature in the fields of software development and cyber security. She is responsible for the internal and external publications of Guardicore’s R&D, product and research (Labs) departments. Prior to Guardicore, Ravit held technical writing positions at Checkpoint Software Technologies and Ixia and provided freelance writing services to cyber security startups. Ravit holds a postgraduate diploma in Language Interpretation and Translation from the Bar Ilan University and a Bachelor’s Degree in English and French language.
Entries by Ravit Greitser
We are proud to announce the release of a new version of the Infection Monkey, GuardiCore’s open-source Breach and Attack Simulation (BAS) tool. Release 1.6 introduces several new features and a few bug fixes.
Micro-segmentation as we know it today has gone through several stages in the last few years, moving from a rising trend for securing software-defined data centers to a full-blown cyber security technology and a top priority on the agenda of nearly every CISO. In this blog we examine the GuardiCore journey to becoming the best micro-segmentation solution.
Law firms are increasingly the target of cyber attack. Cyber criminals recognize law firms as vaults of proprietary sensitive corporate data and as such optimal target for cyber security attacks. From the Panama Papers to DLA Piper, 2017 was one of the most challenging cybersecurity years for law firms and there is no indication that this trend is slowing down in 2018.
As this security flaw still exists and puts Azure environments at risk, we believe it’s important to continuously verify whether your environment is vulnerable. To do that we integrated Azure password harvesting capabilities into the Infection Monkey.
We are pleased to announce a new version of our Infection Monkey open source attack simulation tool with several significant enhancements. We first introduced the Infection Monkey in 2016 and have continuously developed and supported it. Part of what we did came from feedback we received from our community so thanks everyone for contributing!
We recently added File Integrity Monitoring (FIM) to the GuardiCore Centra Security Platform and wanted to share how it can help your organization detect breaches and achieve compliance with regulations such as PCI DSS and HIPAA.
The Samba team released a patch on May 24 for a critical remote code execution vulnerability in Samba, the most popular file sharing service for all Linux systems. Samba is commonly included as a basic system service on other Unix-based operating systems as well.
This vulnerability, indexed CVE-2017-7494, enables a malicious attacker with valid write access to a file share to upload and execute an arbitrary binary file which will run with Samba permissions.
Last week we announced the discovery of Bondnet, a new botnet that was uncovered by GuardiCore Labs. The originator of Bondnet had installed a cryptocurrency miner and backdoor in thousands of servers of varying power and conscripted them into a botnet – a group of computing devices that can be centrally controlled for malicious purposes.
Two weeks ago we released the latest version of our flagship product Centra. For those of you who were unable to review the upgrade yet, here’s a short list of what it came with: