ATT&CK is a knowledge base of adversary tactics and techniques that is based on real-world observations. ATT&CK v9 adds container-related attack techniques, which is the result of a project conducted by MITRE’s Center for Threat-Informed Defense and sponsored by Microsoft, Citigroup and JPMorgan Chase. There has been a debate on whether or not container techniques…

Last Thursday (April 15th), Rosenworcel made a statement on future priorities by reestablishing the Communications, Security, Reliability, and Interoperability Council (CSRIC) with a focus on 5g networks and software and cloud services vulnerabilities. “I am committed to working with our federal partners and the private sector to increase the security and resiliency of our nation’s…

According to NVIDIA, Morpheus leverages machine learning to identify anomalies and threats — such as phishing, data leaks and malware — through real-time inspection of all IP traffic in an organization’s data centers. NVIDIA Morpheus framework uses BlueField DPUMorpheus works with NVIDIA’s BlueField data processing units (DPUs), a powerful processor designed specifically for data centers….

Developed by Greyware Automation Products, Inc., Domain Time II is a time synchronization software designed to help enterprises ensure accurate time across their networks. The suite of tools provides testing, administration, and auditing capabilities. Domain Time II consists of client and server programs, and both use the same executable to check for updates, namely dttray.exe….

Founded in 2017 and headquartered in New York City, Cylera seeks to protect both healthcare organizations and patients, providing a security and analytics platform that aims to deliver asset management, risk analysis, and threat detection for IoT, ICS, and IoMT (Internet of Medical Things). Cylera seeks to secure the entire connected environment, providing insights and…

Nupur Goyal, senior product marketing manager at Microsoft, told SecurityWeek that the tool is free and available to anyone. “Our assessment tool will help orgs assess readiness across identities, devices, apps, infrastructure, network and data, and then provide go-dos and deployment guidance to help them reach key milestones,” Goyal said. Due to the COVID-19 coronavirus…

Dutch Probe China’s Huawei for Possible Spying: Report

The probe, reported by De Volkskrant newspaper, comes as a series of western countries weigh the risks of allowing the Chinese telecoms giant to become involved in the new 5G mobile phone infrastructure. Volkskrant said the AIVD refused to confirm the report. AIVD spokesman Hilbert Bredemeijer declined to comment, saying the spy agency “does not…

U.S. Blocks China Mobile, Citing National Security

The Federal Communications Commission said that because of China Mobile USA’s ownership and control by the Chinese government, allowing it into the US market “would raise substantial and serious national security and law enforcement risks.” The decision brings the Chinese telecoms giant’s eight-year effort to crack the US market to an end, but was not…