Ad Image

Endpoint Security and Network Monitoring News for the Week of October 20; Malwarebytes, Atlas VPN, Broadcom, and More

Endpoint Security and Network Monitoring News for the Week of October 20

The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of October 20. This curated list features endpoint security and network monitoring vendors such as Malwarebytes, Atlas VPN, Broadcom, and more.

Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.

Download Link to Data Integration Buyers Guide

Endpoint Security and Network Monitoring News for the Week of October 20


Malwarebytes Report: “The Forgotten Malvertising Campaign”

In a recent blog post, Malwarebytes looks at a malvertising campaign that seems to have flown under the radar entirely for at least several months. It is unique in its way to fingerprint users and distribute time sensitive payloads. The threat actor is running a campaign targeting Notepad++, a popular text editor for Windows as well as similar software programs such as PDF converters. The blogpost goes into detail how this is done.

Read on for more.

Largest DDoS Attacks Ever Reported by Google, Cloudflare and AWS

Internet infrastructure providers Google Cloud, Cloudflare and Amazon Web Services have reported the largest ever distributed-denial-of-service (DDoS) attacks. The DDoS attacks were reported on October 10, with the cloud service providers noting that the attacks were part of a mass exploit of a zero-day vulnerability. In a blog post about the DDoS attacks, Google explained that it was the largest DDoS attack “to date”, with the requests per second (rps) peaking at over 398 million, making it seven and a half times larger than the previous record-breaking DDoS attack. Google noted that 398 million rps is equivalent to “more requests than the total number of article views reported by Wikipedia during the entire month of September 2023”.

Read on for more.

Atlas VPN Report: “Patient Data Breaches Doubled, Reaching 87M in 2023”

According to the data presented by the Atlas VPN team, 87 million patients in the United States had their information breached in 2023. That is more than twice as much as last year when 37 million people had their data exposed. The data is based on the U.S. Department of Health and Human Services Office for Civil Rights database. Health organizations must report any health data breaches that impact 500 or more people to the secretary, which makes them public.

Read on for more.

Cybeats Announces Partnership with CodeSecure

Cybeats Technologies Corp. and CodeSecure, formerly the products division of GrammaTech and a provider of application security testing products, this week announced a technology partnership to help customers proactively monitor and remediate software supply chain security threats. The CodeSecure CodeSentry software composition analysis platform will provide binary-derived software bill of materials (SBOM) intelligence to Cybeats for automating the detection, prioritization and mitigation of open source vulnerabilities when source code is not available.

Read on for more.

Keeper Security Launches New Open Source Project

Keeper Security, a leading provider of zero-trust security solutions, this week announced a new open source project for software developers and DevOps to easily and securely sign git commits with their Keeper vault. Through Keeper Secrets Manager (KSM), users can now use Secure Shell (SSH) keys stored in their Keeper Vault to digitally sign commits to confirm the authenticity of their code. Keeper and developers at The Migus Group teamed up to create the open-source solution to sign git commits using the SSH keys stored in a user’s Keeper Vault. The integration provides developers with a secure and encrypted repository for their SSH keys and removes the practice of storing them on disk, both increasing security and streamlining DevOps workflows.

Read on for more.

Matt Quarles and Michael Callahan Join API Security Provider, Salt Security

Salt Security, a leading API security company, this week announced that Matt Quarles and Michael Callahan have joined the company as Chief Revenue Officer (CRO) and Chief Marketing Officer (CMO), respectively. Combined, Quarles and Callahan have more than four decades of experience driving business strategy and leading sales and marketing functions at both startups and public companies across the IT and cybersecurity industry. Quarles and Callahan will play a pivotal role in leading Salt Security into its next phase of growth and executing the company’s global go-to-market strategy.

Read on for more.

Broadcom Ships “Industry’s First” 5nm Single-Chip 25.6Tb/s Router

Broadcom Inc., this week announced the immediate availability of Qumran3D, the next generation of the StrataDNX family of single chip routers. Qumran3D “raises the bar for carrier and cloud operator solutions by delivering high-performance, low-power, and security-rich networking.” Qumran3D offers 25.6 Terabits per second of routing in a fixed form factor, with Ethernet port rates from 100 Gb/s to 800 Gb/s. A routing solution based on a single Qumran3D will save up to 66 percent more energy and up to 80 percent more rack space compared to previous generations.

Read on for more.


Expert Insights Section

expert insight badge

Watch this space each week as our editors will share the best written and video resources from Insight Jam, Solutions Review’s enterprise tech community for business software pros. The goal? To help you gain a forward-thinking analysis and remain on-trend through expert advice, best practices, trends and predictions, and vendor-neutral software evaluation tools.

Solutions Review Launches New Insight Jam Community for Enterprise Technology Professionals

We are excited to bring an entirely new distribution channel to Insight Jam, and provide our readers with guidance, best practices, and advice on top-of-mind topics in enterprise technology, and our PR and vendor partners the ability to measure their impact on the community.

Read on for more.

What Does Successful Cyber Warfare Look Like?

Mike Starr of trackd charges into battle to redefine what success in cyber warfare looks like in the modern age. Conventional shooting or “kinetic” wars used to end with a clear winner and clear loser, and the closure was palpable in ticker-tape parades, terms-of-surrender signings, and mass discharges of returning soldiers. That, clearly, is no longer the case, exemplified by the seemingly endless analyses during our wars in Afghanistan and Iraq that asked a common question: what does victory look like? It may be time to ask that question – or a version of it – about InfoSec: what does successful cyber warfare look like? Cybersecurity professionals have been battling threat actors since at least the inception of the public internet, so we’re starting our 4th decade in this war against the bad guys, and I don’t think anyone in the cybersecurity community would say with any degree of seriousness that we’re winning, or even moving in the direction of a conventional victory.

Read on for more.

Download Link to Data Integration Buyers Guide

Share This

Related Posts

Follow Solutions Review