The new cybersecurity company's solution is available as a device-native service, a mobile app, browser-based, and via a developer-focused API. Credit: Gerd Altmann Cybersecurity company Circle Security has emerged from stealth with the release of a new platform “purpose-built” to protect against credential-driven threats and cloud attacks. Powered by a decentralized architecture, Circle is available as a device-native service, a mobile app, a browser-based solution, and via a developer-focused API, according to the firm.Circle Security boasts an impressive advisory board featuring several high-profile cybersecurity thought leaders including Bruce Schneier, Lucia Milica, global CISO of Proofpoint, and Eric Liebowitz, CISO of Thales Group.Credential-driven data breaches are the biggest threat vector for most companies. Cybercriminals are prioritizing stolen credentials for use in attacks, with weak credentials significant contributors to cloud security risks. Meanwhile, access brokers – criminal groups that sell stolen access credentials – have become a key component of the eCrime threat landscape. Circle platform offers “new level of security” against phishing, credential-stealing attacksCircle’s decentralized platform ensures secure access to cloud data and applications while protecting data during sign-in and throughout the user journey, no matter where the data travels, the company said in a press release. “The result is that enterprises can now rely on a single platform to secure access to sensitive data and protect it from exposure with full visibility and control on whichever user devices it resides,” it added. Circle cryptographically unifies the capabilities of device trust, data access, and data protection into a unified platform capable of preventing credential-driven attacks and cloud compromise, the firm claimed. By reducing the user’s capability to authenticate on their own, the system provides a new level of security against phishing and other credential-stealing attacks, according to Schneier. Circle is available in Base, Standard, and Premium options, each priced accordingly.Credential-focused cyberattacks plague organizations, empower cybercriminal activityCredential-focused cyberattacks are plaguing organizations and empowering cybercriminal activity. Last year, threat actors exposed or stole 22.62 billion credentials and personal records, ranging from account and financial information to emails and US Social Security numbers, according to a recent report from Flashpoint. “The proliferation of illegally obtained data gives threat actors ample opportunities to circumvent organizational security measures and controls – empowering ransomware groups like LockBit to hold data for ransom, or sell or expose it on illicit markets,” the report read. Cybercriminals are doubling down on stolen credentials, demonstrating a clear demand for access broker services. There was a 112% year-over-year increase in advertisements for access broker services identified last year compared to 2021, with more than 2,500 advertisements for access detected across the criminal underground, according to the CrowdStrike 2023 Global Threat Report. There was also a notable shift away from malware use related to adversaries’ prolific abuse of valid credentials to facilitate access and persistence in victim environments, the research found.What’s more, weak credentials contribute significantly to persistent cloud security risks. The latest Unit 42 Cloud Threat Report found that 76% of organizations don’t enforce MFA for console users, 58% don’t enforce MFA for root/admin users, and 57% don’t enforce symbols in passwords. Related content feature The CSO guide to top security conferences Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you. By CSO Staff May 01, 2024 15 mins Technology Industry IT Skills Events feature 3 Windows vulnerabilities that may not be worth patching Some vulnerabilities eat up a security team’s time and resources yet provide little or nothing in the way of true protection. Some may even introduce more risk to a network. By Susan Bradley May 01, 2024 7 mins Windows Security Patch Management Software Security Practices news analysis Chinese threat actor engaged in multi-year DNS resolver probing effort The unusual and persistent probing activity over the span of multiple years should be a reminder to organizations to identify and remove all open DNS resolvers from their networks. By Lucian Constantin Apr 30, 2024 7 mins Cyberattacks Network Security news Securiti adds distributed LLM firewalls to secure genAI applications The new offering is aimed at protecting against prompt injection, data leakage, and training data poisoning in LLM systems. By Shweta Sharma Apr 30, 2024 4 mins Generative AI PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe