Subscribe To Our Daily Enewsletter:

Managed Security Services Provider (MSSP) News: 22 December 2020

Each business day, MSSP Alert broadcasts a quick lineup of news, analysis and chatter from across the managed security services provider ecosystem.

  • The Content: Written for MSSPs, SOC as a Service (SOCaaS), Managed Detection and Response (MDR), Extended Detection and Response (XDR) and MSP security providers — and those who need to partner up with such companies.
  • Frequency and Format: Every business morning. Typically one or two sentences for each item below.
  • Reaching Our Inbox: Send news, tips and rumors to Joe@AfterNines.com.

A. Today’s MSSP News Alerts

1. SolarWinds Orion Attack Update: Dozens of email accounts at the U.S. Treasury Department were compromised with hackers breaking into systems used by the department’s highest-ranking officials, the Associated Press reports. Separately, ARIA Cybersecurity Solutions, a CSPi business, is offering free use of the ARIA Advanced Detection and Response (ADR) for a three-month period to detect and stop attacks related to the SolarWinds Orion Sunburst hack. Track all updates SolarWinds Orion attack updates here.

2. Partnership – Cybereason and Oracle: Cybereason has adopted Oracle Cloud Infrastructure (OCI) as its preferred platform to power the Cybereason Defense Platform and support its global expansion. Also, Oracle and Cybereason entered into a partnership to jointly market and sell solutions. Cybereason specializes in endpoint detection and response (EDR), eXtended detection and response (XDR) next-gen anti-virus (NGAV), and proactive threat hunting.

3. Partner Program – Zero Trust Cybersecurity: ColorTokens has announced a partner program and associated portal for distributors, resellers, and other technology service providers.

4. Ransomware Attack – Kentucky Town: The Jefferson County Property Valuation Administrator’s office in Louisville, Kentucky has suffered a ransomware attack, WDRB reports. The office is restoring data from a backup, and doesn’t plan to pay the hackers’ ransomware demands.

5. Ransomware Attack – Washington Town: The city of Ellensburg, Washington, has suffered a ransomware attack that has impacted all city departments — including billing, administration and financial services, YakTriNews reports. The city, which had roughly 21,000 residents as of 2018, is still formulating a recovery strategy.

6. Ransomware Attack – Baltimore Schools Fallout: Unions representing Baltimore County public school principals and teachers delivered a letter to district leaders over the weekend, stating the lack of transparency and communication following the recent ransomware attack is “wreaking havoc upon havoc,” The Baltimore Sun reports.

7. Ransomware Task Force Forms: The Institute for Security and Technology (IST) has launched a Ransomware Task Force (RTF) to “provide clear recommendations for both public and private action that will significantly reduce the threat posed by this criminal enterprise.” More details and an associated RTF website are expected to debut in January 2021. Founding RTF members include:

  • Aspen Digital
  • Citrix
  • The Cyber Threat Alliance
  • Cybereason
  • The CyberPeace Institute
  • The Cybersecurity Coalition
  • The Global Cyber Alliance
  • McAfee
  • Microsoft
  • Rapid7
  • Resilience
  • SecurityScorecard
  • Shadowserver Foundation
  • Stratigos Security
  • Team Cymru
  • Third Way
  • UT Austin Stauss Center
  • Venable LLP

8. Network Security Assessments: Arista Networks has announced Attack Surface Assessment, an advanced security service delivered through the recent acquisition of Awake Security. This new offering identifies cyber security risks from devices, users or third-party systems, especially those that go unmonitored today since they are beyond the visibility of the security team. Designed and delivered by experts who have responded to some of the world’s most consequential breaches, this assessment focuses on detecting and evicting the attacker rapidly.

9. Emotet Malware Campaign: Proofpoint has uncovered a new Emotet malware campaign pushing out nearly 100,000 messages. The possible threat actor behind it was last active in late October 2020, the company says.

B. MSSP and Cybersecurity Virtual Events and Conference Calendar

  1. Secureworks Connect 2021 (February 9-10, Virtual Conference)
  2. RSA Conference 2021 (May 17-21, Virtual Conference)
  3. Black Hat USA 2021 (July 31-August 5, Las Vegas)
  4. FireEye Cyber Defense Summit 2021 (October 4-8)
  5. BonusMSSP Alert’s complete event calendar
Return Home

2 Comments

Comments

    Chad Ostreicher:

    I still can’t believe 425 out of 500 fortune 500 companies were affected by the SolarWinds breach. Pure craziness!

    Joe Panettieri:

    Chad: It’s important to put the numbers in context. Yes, thousands of companies had to update/adjust SolarWinds Orion to mitigate the vulnerability. That was a major time and resource commitment for MSPs & IT managers worldwide. But that doesn’t mean all those companies running Orion were breached or attacked. Our latest analysis of who got hit and how SolarWinds has mitigated the threat is here.

    Best,
    -jp

Leave a Reply

Your email address will not be published. Required fields are marked *