Cybersecurity daily news

MSSP Market Update: Quest Launches ID, Ransomware Protection Solutions

 Kaseya's State of Backup and Recovery Report 2025: Navigating the Future of Data Protection went live this week.

The report found that while 40% felt confident in their systems, 33% have reported nightmares – and many are less prepared for disasters than they believe. A full 75% of respondents said they have policies and controls to secure workloads across public cloud, endpoints, SaaS apps and servers/VMs. However, that means 25% of workloads still don't have these protections in place. 

Over half of organizations surveyed said their IT teams spend more than two hours per day or more than 10 hours per week monitoring, managing and troubleshooting backups. And there's a disconnect between what organizations think about their restoration capabilities and the reality -- more than 60% of respondents believed they could recover in under a day; however, only 35% could. Check out more here.

Now, here's today's MSSP update. Drop me a line at [email protected] if you have news to share or want to say hi!

Today's MSSP Update

1. Quest Software unveils new solutions for ransomware, identity: Quest this week launched its Security Guardian Shields Up and Disaster Recovery for Identity solutions to defend against ransomware and identity threats. Security Guardian Shields Up allows customers to temporarily freeze all changes to Tier 0 objects, disrupting attacks against Active Directory that involve lateral movement and persistence. Disaster Recovery for Identity allows for instant, secure AD restoration, even after a full-scale ransomware attack.

2. NordStellar intros ASM feature: Threat exposure management platform NordStellar announced this week Attack Surface Management (ASM) a new feature that will provide continuous visibility into an organization’s external attack surface. The feature aims to improve organizations’ overall security posture and help them manage their attack surface, minimize exposure to external threats, and meet regulatory requirements for vulnerability assessments.

3. New Kimsuky intrusions: North Korean state-sponsored advanced persistent threat operation Kimsuky is making increasingly stealthy intrusions, SC Media reports. The attackers are using the remote desktop protocol and a trio of proxy tools as part of a new campaign that shifts away from the group's previous focus on backdoor malware. Kimsuky, also known as APT43, Velvet Chollima, and Emerald Sleet, distributes spear-phishing emails with malicious PDF, Word, or Excel-spoofing LNK files, which prompt the execution of several payloads, an analysis from AhnLab's Security Intelligence Center revealed.

4. Data breaches spiking: Data breaches last year impacted more than 5.5 billion accounts, which was eight times higher than the total number of compromised accounts in 2023, Cybernews reports. Most of the increase was fueled by a breach involving more than three billion email addresses from older breaches, which were primarily from Russia, the U.S., and China, according to Surfshark. Global B2B data aggregation firm DemandScience — which had data from over 120 million individuals, most of whom are in the U.S., compromised in a February attack — was also a key contributor to the surge in breached accounts. Additional findings revealed that China, Russia, and the U.S. accounted for nearly half of all breached accounts last year, while Europe, particularly Russia and France, had the highest data breach density.

You can skip this ad in 5 seconds