Remove cloud-security startup-aims-to-map-and-track-all-the-it-and-security-things
article thumbnail

The BlueNoroff cryptocurrency hunt is still on

SecureList

We reported about the first variant of such software back in 2018, but there were many other samples to be found, which was later reported by the US CISA (Cybersecurity and Infrastructure Security Agency) in 2021. If there’s one thing BlueNoroff has been very good at, it’s the abuse of trust.

article thumbnail

Top Deception Tools for 2022

eSecurity Planet

Security vendors and startups use deception techniques to confuse and befuddle attackers. By masking high-value assets in a sea of fake attack surfaces, attackers are disoriented and attack a fake asset, in the process alerting security teams to their presence. But it can work the other way. What is Deception Technology?

article thumbnail

Top Cybersecurity Startups to Watch in 2022

eSecurity Planet

Information security products , services, and professionals have never been in higher demand, making for a world of opportunities for cybersecurity startups. With evolving attack methodologies due to machine learning, quantum computing, and sophisticated nation-state hackers, security startups are receiving record funding.