Léargas Managed SOC Appliance

Critical Path Security is pleased to announce that we have started shipping our enterprise grade Léargas Managed SOC appliances! The hardware has been designed to stand up to the rigor and demand of large scale networks with the base appliance capable of ingesting and processing 10 gbps throughput!  We are also pleased to announce the release of Léargas RTL! This release comes hot on the coattails of Road Apples and extends many of it features including; Extensive upgrades to our TOR ingest for continuous dark web monitoring and advanced breach notifications. Natural Language Processing has been added to our Twitter ingest providing sentiment analysis that is used to identify comments from potential threat actors. Even more enrichment, correlating all dns flows & predict queries to highlight requests to potential malware sites. Eight new alerts have been added to our library keep our analysts abreast of important situations as they unfold.  Six new…

0 Comments

Are you trusting your Managed IT Provider with your security? You’re both wrong.

Don’t judge a book by its cover. Not all that glitters is gold. If it sounds too good to be true, then it probably is. These are critical phrases to keep in mind when hearing pitches from Managed Service Providers (MSPs), since many of them will make claims to get your business but then deliver the minimal amount of support and security possible. With the upsurge in the general public’s awareness regarding cybersecurity, the number of blatantly unethical claims regarding service provider ability to protect your environment has undergone a similar surge. Phrases like “#1 cybersecurity firm in <insert city name here>”, “Secure your systems with our advanced compliance package”, “Go beyond regular support and talk to us about our Security and Compliance offerings!” are prominently plastered on the home page of thousands of managed IT providers. This dangerous, but legal, misrepresentation of ability and skill sets hurts not only…

0 Comments

Identity Protections After Private Information Enters the Public Domain

We live in the age of large-scale data breaches. Equifax, Target, Home Depot, LinkedIn - take your pick. Users have become jaded to such phenomena since they seemingly occur on a daily basis. This fact only exacerbates the problem even further. We are all guilty of hearing about a breach and simply looking the other way in the hope that our data wasn’t affected. After all, who am I that a criminal on the other side of the world would want MY personal information? Well, you may not see yourself as being important, but that doesn’t mean that your data is equally unimportant. Identity theft is a festering wound that we would rather ignore than acknowledge and treat. If we have learned anything from the 24 hour news cycle it should be that we can no longer simply rely on companies to protect our personal information. Due to this fact, it…

0 Comments

Patrick Kelley interviewed by 11Alive/NBC News – Money laundering using Uber Rides.

That person uses online chat groups and other social media to reach out and recruit Uber and Lyft drivers for the scheme. Uber says that part is key, because if there are no drivers willing to participate – there is no scheme. Once on board, the drivers can say where and when they want to take a ride, allowing them to make money on everyday errands or even long distance trips they were already planning to take for personal reasons. Ensign says the ringleader overseas initiates the ride by hacking into existing Uber accounts. Uber says credit card and personal information are encrypted, so there’s no concern about identity theft, but weak and leaked passwords are allowing crooks to manipulate the service. People usually never even know their account has been hacked because their credit card information gets swapped out with a stolen card to pay for the ride. The…

0 Comments