Two weeks ago we released the latest version of our flagship product Centra. For those of you who were unable to review the upgrade yet, here’s a short list of what it came with:
https://www.guardicore.com/wp-content/uploads/2019/02/guardicore-press-releases-logo-banner2.jpg 200 920 Ravit Greitser https://www.guardicore.com/wp-content/uploads/2019/02/guardicore-logo-white-space.png Ravit Greitser2016-04-24 01:48:402019-02-25 10:50:34What's New with Centra™ 2.0 Build 15
https://www.guardicore.com/wp-content/uploads/2016/03/hands.png 243 320 Ofri Ziv https://www.guardicore.com/wp-content/uploads/2019/02/guardicore-logo-white-space.png Ofri Ziv2016-03-22 08:32:492019-02-25 10:51:14Detect, Protect, Collaborate
With today’s current threats, collaboration is mandatory. GuardiCore believes that it’s important to integrate multiple solutions together; provide protection and at the same time strengthen our customers’ other defences.
Earlier this month we announced that GuardiCore Centra™, our flagship product has been integrated with Check Point vSec Gateway to deliver our joint customers a coordinated solution to effectively respond to active and future data center breaches. We wanted to take this opportunity to explain how this integration works and show how it ties nicely with our greater vision of data center remediation.
https://www.guardicore.com/wp-content/uploads/2016/03/Revealing-GuardiCore-Reveal.jpg 187 686 Lior Neudorfer https://www.guardicore.com/wp-content/uploads/2019/02/guardicore-logo-white-space.png Lior Neudorfer2016-03-04 09:53:292019-02-25 10:52:08Revealing GuardiCore Reveal™
https://www.guardicore.com/wp-content/uploads/2016/02/Avoiding-the-Train-Wreck-Waiting-to-Happen.jpg 187 686 Sharon Besser https://www.guardicore.com/wp-content/uploads/2019/02/guardicore-logo-white-space.png Sharon Besser2016-02-29 08:37:582019-02-25 10:52:48Avoiding the Train Wreck Waiting to Happen
In July 2015, following weeks of research, we identified a trend in ransomware attacks. The question we then posed was “Is it a possible scenario that ransomware campaigns become a significant threat to enterprises, and take control over large Data Centers?” You can read more about it in Misha’s blog regarding Data Center Ransomware. Unfortunately, less than a year later, our prophecy is becoming a reality. No, Israel’s power grid wasn’t hacked, but ransomware hit Israel’s Electric Authority. No, Los Angeles County health department wasn’t closed but it was targeted in ransomware attack. Yes, other ransomware attacks are able to shut down the network and Data Centers, “forcing the hospital to return to pen and paper for its record-keeping”. Read more
https://www.guardicore.com/wp-content/uploads/2016/12/data-breach.png 187 686 Daniel Goldberg https://www.guardicore.com/wp-content/uploads/2019/02/guardicore-logo-white-space.png Daniel Goldberg2016-02-02 10:56:122019-02-25 10:53:13Learning from NSA's Master Hacker
“The big question you need to think about is if you have an intrusion somewhere in your network, can you then defend against this lateral movement?” – Rob Joyce, Chief of the TAO
Rob Joyce, head of the NSA’s Tailored Access Operations (TAO) elite division, recently spoke to a large audience at the Usenix Enigma security conference in San Francisco. Joyce talked about TAO’s process for exploiting victim networks. This was the first public talk made by any member of the NSA’s team which is considered among the best cyber-warfare intelligence gathering organization in the world.
https://www.guardicore.com/wp-content/uploads/2016/01/Illegal-Mining-the-Cyber-Version.jpg 187 686 Daniel Goldberg https://www.guardicore.com/wp-content/uploads/2019/02/guardicore-logo-white-space.png Daniel Goldberg2016-01-21 13:00:492019-02-25 10:53:53Illegal Mining, the Cyber Version
Illegal mining is a serious problem in the real world. Lately, it has also become popular with cyber attackers who manage to mine digital currency through untargeted attacks. Untargeted attacks are a common problem, not as attention grabbing as APTs, but still responsible for a large percentage of attacks. In this post, using Guardicore’s Data Center Security Suite, we’ll take a look at yet another type of untargeted attacks, as we first reported with Alex. Our attacker “galaden666” is a Ukrainian gamer who makes money by mining a new digital currency called Litecoins (a variant of Bitcoins) on compromised servers by stealing their CPU cycles.
https://www.guardicore.com/wp-content/uploads/2015/12/Yup-We-Can-See-It-Coming.jpg 187 686 Sharon Besser https://www.guardicore.com/wp-content/uploads/2019/02/guardicore-logo-white-space.png Sharon Besser2015-12-23 07:54:182019-02-25 10:54:35Yup, We Can See It Coming
On December 17th, 2015 Juniper issued an advisory indicating that they had discovered unauthorized code in the ScreenOS software that powers their Netscreen firewalls. This advisory covered two distinct issues; a backdoor in the VPN implementation that allows a passive eavesdropper to decrypt traffic and a second backdoor that allows an attacker to bypass authentication in the SSH and Telnet daemons. There are speculations that the backdoor was installed by “State Sponsored” actors. Shortly after Juniper posted the advisory, an employee of Fox-IT stated that they were able to identify the backdoor password in six hours. (So much for Government efficiency hiding their actions)
https://www.guardicore.com/wp-content/uploads/2015/12/liu-bolin-0011.jpg 633 800 Uri "Cyber" Hershcovits https://www.guardicore.com/wp-content/uploads/2019/02/guardicore-logo-white-space.png Uri "Cyber" Hershcovits2015-12-09 10:23:062019-02-25 10:55:14Pay No Attention to the Man Behind the Curtain!
How do you detect a security breach inside your network? How do you collect the necessary intelligence to protect your assets properly? Sun Tzu, author of The Art of War, said that convincing your opponents to unveil their identity without knowing that they are being watched is one of the most important keys to winning a war. Attack deception is one of the best techniques to make attackers unveil their identity and gain valuable intelligence. While it is not new, advanced attack deception methods take advantage of Sun Tzu’s strategy.
https://www.guardicore.com/wp-content/uploads/2015/12/Caught-red-handed-Alex.jpg 187 686 Daniel Goldberg https://www.guardicore.com/wp-content/uploads/2019/02/guardicore-logo-white-space.png Daniel Goldberg2015-12-02 13:50:252019-02-25 10:55:57Caught red handed - Alex
Opportunistic hackers are far from the limelight these days but they still exist and can cause large amounts of damage if they manage to break into your systems. We’ve recently observed our Data Center Security Suite catch such a hacker, an “Alex” from Romania who has kindly enough supplied his own name and private domain for publicity.
https://www.guardicore.com/wp-content/uploads/2015/10/vm-world.jpg 187 686 Dave Burton https://www.guardicore.com/wp-content/uploads/2019/02/guardicore-logo-white-space.png Dave Burton2015-10-20 18:24:552019-02-25 10:56:355 Key Takeaways from VMworld Barcelona
So, VMworld Europe just concluded last week and certainly there was a lot to talk about, from hybrid clouds, VMware’s acquisition of Boxer, Dell’s acquisition of EMC and how this affects VMware (it doesn’t according to Dell CEO Michael Dell), VMware CEO Pat Gelsinger’s keynote where he highlighted the five imperatives of the digital business and also called out of some enterprises for lack of agility (“Elephants must learn to dance”) and of course, security, which seemed to be integrated into almost every topic at the event.