article thumbnail

MY TAKE: ‘Network Detection and Response’ emerges as an Internet of Things security stopgap

The Last Watchdog

Data collected by IoT devices will increasingly get ingested into cloud-centric networks where it will get crunched by virtual servers. I had a fascinating discussion about this with Sri Sundaralingam, vice president of cloud and security solutions at ExtraHop , a Seattle-based supplier of NDR technologies. We spoke at RSA 2020.

Internet 196
article thumbnail

Google to Pay a record $391M fine for misleading users about the collection of location data

Security Affairs

The authorities started the investigation into Google collection practice following a 2018 Associated Press article that revealed Google “records your movements even when you explicitly tell it not to.”. not hidden); and.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Rapid7 InsightIDR Review: Features & Benefits

eSecurity Planet

Rapid7 combines threat intelligence , security research, data collection, and analytics in its comprehensive Insight platform, but how does its detection and response solution – InsightIDR – compare to other cybersecurity solutions? Gartner Magic Quadrant and Gartner Peer Insights. Rapid7: Company Background.

DNS 126
article thumbnail

Secret Service Investigates Breach at U.S. Govt IT Contractor

Krebs on Security

Secret Service is investigating a breach at a Virginia-based government technology contractor that saw access to several of its systems put up for sale in the cybercrime underground, KrebsOnSecurity has learned. The Department of Homeland Security did not respond to requests for comment, nor did the Department of Transportation.

article thumbnail

Google will pay $29.5M to settle two lawsuits over its location tracking practices

Security Affairs

Given the vast level of tracking and surveillance that technology companies can embed into their widely used products, it is only fair that consumers be informed of how important user data, including information about their every move, is gathered, tracked, and utilized by these companies. The IT giant will pay $9.5 million to D.C.

article thumbnail

Russia-Linked Turla APT group Hijacked C2 of the Iranian OilRig

Security Affairs

” Turla attackers used many other tools and malware in the latest campaigns, such as a custom dropper to deliver the Neptun backdoor, a USB data collecting tool, a hacking tool that combines four NSA tools ( EternalBlue , EternalRomance , DoublePulsar , SMBTouch ).

article thumbnail

Volt Typhoon Disrupts US Organizations, CISA Issues Alerts

eSecurity Planet

Reconnaissance Reconnaissance is the starting point of Volt Typhoon’s cyber campaign, characterized by thorough planning and data collection. With increased network access and control , they have the capacity to alter operational technology (OT) assets and disrupt critical services.

Internet 113