Resecurity Expands LATAM Presence Through Strategic Partnership with INFORC in Ecuador
LOS ANGELES & QUITO, Ecuador--(BUSINESS WIRE)--Jun 15, 2025--
Resecurity, a U.S.-based cybersecurity and threat intelligence company, is pleased to announce a new strategic partnership with INFORC ECUADOR, a leading Ecuadorian cybersecurity company that specializes in offering cybersecurity solutions and services to organizations across the region.
This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20250615849929/en/
Resecurity Expands LATAM Presence Through Strategic Partnership with INFORC in Ecuador
This partnership marks a key development in Resecurity's expansion strategy across Latin America, solidifying its presence in Ecuador and further enhancing the availability of its advanced threat intelligence and cybersecurity solutions to local organizations.
Founded in 2005, INFORC ECUADOR® is widely recognized for its expertise in information security compliance, secure software development, incident response (CSIRT), and offensive security testing. As a reseller of Resecurity's cybersecurity solutions, INFORC will help local organizations strengthen their cybersecurity posture by delivering Resecurity's state-of-the-art products, including the Context™ threat intelligence platform, advanced endpoint protection, and fraud prevention solutions.
Through this partnership, INFORC will:
'Our partnership with Resecurity is a significant milestone in our mission to deliver cutting-edge cybersecurity solutions to Ecuador,' said Ing. Carlos Jumbo, CEO of INFORC. 'By reselling Resecurity's solutions, we can offer our clients world-class cyber threat intelligence and risk management capabilities to help them secure their operations and meet compliance requirements.'
'We are thrilled to partner with INFORC to bring our advanced cybersecurity solutions to Ecuador,' said Gene Yoo, CEO of Resecurity. 'This partnership helps us further extend our presence in Latin America and equips INFORC with the tools and expertise needed to help local organizations defend against increasingly sophisticated cyber threats.'
The collaboration is poised to address the growing demand for cybersecurity solutions in Ecuador, especially in light of rising cyber threats targeting both public and private sector entities. INFORC's trusted status in the region, combined with Resecurity's innovative technology, will provide Ecuadorian organizations with the advanced tools necessary to proactively manage and mitigate digital risks.
With this agreement, Resecurity continues its commitment to building strong relationships with regional partners across Latin America, reinforcing its role as a key player in the cybersecurity space.
About Resecurity®
Resecurity® is a cybersecurity company that delivers a unified endpoint protection, fraud prevention, risk management, and cyber threat intelligence platform. Known for providing best-of-breed data-driven intelligence solutions, Resecurity's services and platforms focus on early-warning identification of data breaches and comprehensive protection against cybersecurity risks. Founded in 2016, it has been globally recognized as one of the world's most innovative cybersecurity companies with the sole mission of enabling organizations to combat cyber threats regardless of how sophisticated they are. Most recently, by Inc. Magazine, Resecurity was named one of the Top 10 fastest-growing private cybersecurity companies in Los Angeles, California. As a member of InfraGard National Members Alliance (INMA), AFCEA, NDIA, SIA, FS-ISAC, and the American Chamber of Commerce in Saudi Arabia (AmChamKSA), Singapore (AmChamSG), Korea (AmChamKorea), Mexico (AmChamMX), Thailand (AmChamThailand), and UAE (AmChamDubai). To learn more about Resecurity, visit https://resecurity.com.
About INFORC ECUADOR®
Founded in 2005, INFORC ECUADOR® is a leading Ecuadorian cybersecurity company recognized for its expertise in providing comprehensive cybersecurity services and solutions. With a strong presence in the local market, INFORC specializes in areas such as information security compliance, secure software development, incident response, penetration testing, phishing detection, and cyber intelligence services. The company also offers cybersecurity training, awareness programs, and operates a Computer Security Incident Response Team (CSIRT). INFORC's in-depth knowledge of the Ecuadorian market and its commitment to delivering top-tier security solutions make it a trusted partner for both private and public sector organizations. Learn more at https://www.inforc.lat.
View source version on businesswire.com:https://www.businesswire.com/news/home/20250615849929/en/
CONTACT: Shawn Loveland
[email protected]
KEYWORD: LATIN AMERICA NORTH AMERICA UNITED STATES ECUADOR SOUTH AMERICA CALIFORNIA
INDUSTRY KEYWORD: SOFTWARE TECHNOLOGY SECURITY
SOURCE: Resecurity
Copyright Business Wire 2025.
PUB: 06/15/2025 01:51 PM/DISC: 06/15/2025 01:50 PM
http://www.businesswire.com/news/home/20250615849929/en
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Forbes
34 minutes ago
- Forbes
This New Ransomware Can Irrevocably Destroy Your Files — Backup Now
Anubis rasnomware can destroy your files. Forever. As if the threat from high-profile ransomware actors wasn't critical enough, with the Federal Bureau of Investigation issuing warnings as attacks skyrocket, and ransoms follow suit with, on occasion, ridiculously eye-watering payments demanded, a new ransomware-as-a-service platform has just upped the stakes since again. This time, as well as stealing your data and encrypting your files, the Anubis attackers install a custom wiper that can permanently and irrevocably destroy them at the whim of the hackers. There has been some notable success in disrupting ransomware attackers of late, with devastating strikes by the FBI and Secret Service as well as hackers attacking some of the leading organized ransomware criminal groups. The problem is that as one group is disrupted or disbands, another rises to take their place in the cybercriminal hierarchy. And these groups often bring new and worrying attack tactics with them. Such is the case with the Anubis ransomware-as-a-service platform. 'Anubis is an emerging ransomware-as-a-service group that adds a destructive edge to the typical double-extortion model with its file-wiping feature,' Trend Micro threat researchers Maristel Policarpio, Sarah Pearl Camiling and Sophia Nilette Robles, said in a new report that takes a deep technical dive into the workings of the latest ransomware threat. In an attempt to both set itself apart from other ransomware-as-a-service operations and twist the victim extortion leverage knife even further, Anubis employs a file wiper that, the researchers said, is 'designed to sabotage recovery efforts even after encryption.' This wiper uses a /WIPEMODE parameter to permanently delete the file contents and prevent any attempts at recovery. We know that the Anubis attackers employ a number of methods to deploy the ransomware and execute its feature set, including phishing, command line execution and privilege escalation, not to mention the file-wiping capabilities already discussed. Mitigation strategies, therefore, are relatively straightforward. Let's start with the big one, to mitigate the file-wiper impact. Backup and backup now. Ensuring that you have current offline and even off-site backups is your best defense against the Anubis eraser ransomware. The remainder are nothing new either, as Trend Micro points out: Do all of this and, suddenly, the Anubis ransomware threat becomes a lot less scary. Which isn't the same as saying it can be dismissed, as that would be a very poor and dangerous business decision indeed.


Associated Press
an hour ago
- Associated Press
Proofpoint Joins the Wiz Integration Network (WIN) to Strengthen Cloud Data Security
SUNNYVALE, Calif.--(BUSINESS WIRE)--Jun 16, 2025-- Proofpoint, Inc., a leading cybersecurity and compliance company, today announced the general availability of a powerful integration between its Data Security Posture Management (DSPM) solution and Wiz, a leader in cloud security. As part of the Wiz Integration Network (WIN), the partnership delivers bi-directional enrichment between Proofpoint DSPM and Wiz's Cloud Native Application Protection Platform (CNAPP), providing joint customers with unprecedented visibility, contextual insights, and control over sensitive data in the cloud. Cloud data risks are top of mind for today's CISOs, and with good reason. According to Wiz's recent cloud data security report, 54% of cloud environments have exposed virtual machines or serverless instances containing sensitive data, such as personally identifiable information (PII) or payment information. Even more alarming, 61% of organizations have confidential information exposed in public repositories. With data volumes and sprawl increasing exponentially, organizations face mounting challenges in protecting sensitive information comprehensively across cloud environments. Proofpoint's integration with Wiz fuses data-centric intelligence from Proofpoint with the rich, prioritized context from the Wiz platform, which unifies all risk signals across the cloud environment. With this unified context, security teams can more accurately quantify the risk of data exposure, hefty regulatory fines, and breaches, and allocate remediation resources with confidence. 'Traditional approaches, which often rely on metadata or sample scans, fall short in an environment where adversaries can weaponize any weak point,' said Amer Deeba, group vice president and general manager of DSPM at Proofpoint. 'Combining Wiz's cloud security insights with Proofpoint's data classification enables security teams to see what sensitive data is stored where, who can access it, and the risks associated with it. This integration shifts the paradigm toward comprehensive risk visibility so that teams can make better, faster decisions backed by high-fidelity data.' 'Wiz gives organizations deep visibility into their cloud environments, while Proofpoint brings rich insight into the sensitive data that lives there,' said Oron Noah, vice president of Product & Extensibility at Wiz. 'Together, we help customers understand where their most critical risks are and can take the right steps to protect them. It's a powerful combination for staying ahead of cloud risks and keeping sensitive data secure.' A Unified Risk Lens for Joint Customers, Designed for Today's Multi-Cloud Reality The integration between Proofpoint DSPM and Wiz, available today, delivers powerful bi-directional enrichment, enabling joint customers to gain comprehensive visibility into their cloud data risk landscape. Proofpoint ingests Wiz Issues that combines multiple risks like vulnerabilities, misconfigurations, and other risks and contextualizes this with data exposure findings, while simultaneously sending advanced data classification and sensitivity scoring back to Wiz to enhance risk prioritization across cloud data stores like Amazon S3, Google Cloud Storage, and Azure. Unlike traditional tools that rely on data sampling, Proofpoint DSPM provides full and continuous scanning of both structured and unstructured data. This enables 100% visibility into what sensitive data exists, how it is classified, and its monetary value—insights that are critical for compliance, post-breach investigations, and proactive risk reduction. This mutual exchange gives security teams a unified risk view and strengthens their ability to detect, prioritize, and mitigate threats more effectively. Proofpoint's DSPM also supports broader integration across its cybersecurity ecosystem—including email security, endpoint DLP, and insider threat management—ensuring seamless protection across vectors. Proofpoint also supports SaaS applications and platforms like Databricks, ensuring broad visibility into sensitive data wherever it lives, not just in cloud infrastructure. Key joint customer benefits include: Demonstration at AWS re:Inforce 2025 Proofpoint will showcase the integration with Wiz at AWS re:Inforce, taking place June 16–18 in Philadelphia. Attendees can learn more about the joint solution during a live demo at the Wiz booth on Tuesday, June 17 at 4:00 PM ET. To find out more about Proofpoint's human-centric cybersecurity solutions, please visit: About Proofpoint, Inc. Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations' greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including 85 percent of the Fortune 100, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web. More information is available at Connect with Proofpoint: X | LinkedInView source version on CONTACT: PROOFPOINT MEDIA CONTACT: Estelle Derouet Proofpoint, Inc. [email protected] KEYWORD: UNITED STATES NORTH AMERICA CALIFORNIA PENNSYLVANIA INDUSTRY KEYWORD: PROFESSIONAL SERVICES DATA MANAGEMENT SECURITY DATA ANALYTICS TECHNOLOGY SOFTWARE INTERNET SOURCE: Proofpoint, Inc. Copyright Business Wire 2025. PUB: 06/16/2025 04:57 AM/DISC: 06/16/2025 04:55 AM
Yahoo
3 hours ago
- Yahoo
GTA, Minecraft, Call of Duty among games used as bait in over 19 million attempted cyberattacks
Cybersecurity company Kaspersky has detected over 19 million attempts to download malicious or unwanted files disguised as popular video games – a clear indication that cybercriminals are actively following gaming trends to reach their targets. From April 1, 2024, to March 31, 2025, games such as Grand Theft Auto (GTA), Minecraft and Call of Duty were among those exploited. According to Kaspersky, Gen Z (born between 1997 and 2012) plays more video games than any other generation. 'And not just more, but differently. They (Gen Z) outpace Millennials and Gen X in gaming-related spending, and instead of sticking to a few favourites, Gen Z jumps between numerous titles, chasing viral trends and new experiences,' Kaspersky noted. 'Yet this same spontaneity and openness also make them vulnerable, with cybercriminals exploiting the habits and trust of these players across platforms. For instance, throughout the reported period, more than 400,000 users worldwide were affected.' Kaspersky experts conducted an in-depth analysis using 20 of the most popular game titles among Gen Z – from GTA, NBA and FIFA to The Sims and Genshin Impact – as search keywords. The study covered the period from Q2 2024 to Q1 2025, with March 2025 standing out as the peak month, recording 1,842,370 attempted attacks worldwide. Despite GTA V being released over a decade ago, the Grand Theft Auto franchise remains one of the most exploited, due to its open-world modding capabilities and thriving online community. In total, Kaspersky detected 4,456,499 attempted attacks involving files disguised as GTA-related content. With the highly anticipated release of GTA VI expected in 2026, experts predict a potential spike in such attacks, as cybercriminals may exploit the hype by distributing fake installers, early access offers, or beta invites. Minecraft ranked second, with 4,112,493 attempted attacks, driven by its vast modding ecosystem and enduring popularity among Gen Z players. Call of Duty and The Sims followed with 2,635,330 and 2,416,443 attempted attacks respectively. The demand for cheats and cracked versions around releases such as Modern Warfare III fuels malicious activity, while fans of The Sims searching for custom content or unreleased expansion packs may inadvertently download harmful files presented as mods or early access. As a result of such attacks, users' devices can be infected with various types of unwanted or malicious software – from downloaders that install additional harmful programmes, to trojans that steal passwords, monitor activity, grant remote access to attackers, or deploy ransomware. One common motive is stealing gaming accounts, which are then sold on the dark web or closed forums. Kaspersky experts also analysed darknet marketplaces and closed platforms for advertisements selling compromised gaming accounts and skins. The research indicates a growing number of such listings are appearing not just on the darknet, but also on regular closed forums and Telegram channels – making these illicit assets more visible and accessible than ever. 'This shows that the theft of gaming accounts and digital items is no longer limited to niche cybercrime circles – it's starting to spread into more open online spaces,' Kaspersky said in its statement. 'The barrier to entry for selling or buying stolen accounts has significantly lowered. What was once a technical, underground practice has become a marketplace – fast, accessible, and global. It now takes just a few clicks to join a private Telegram channel and access hundreds of listings offering rare skins, high-rank accounts, and access to premium in-game items. And for gamers, this means the risk of losing an account or having it resold is no longer a rare incident – it's a mainstream threat.' To address this, Kaspersky launched an interactive online game, Case 404, created especially for Gen Z gamers. In this cyber-detective adventure, players dive into fictional cases inspired by real digital threats, learning how to spot scams, phishing attempts, and account takeover tactics common in gaming.