Latest news with #AbnormalSecurity


Techday NZ
22-04-2025
- Business
- Techday NZ
Expel expands MDR platform to boost email threat detection
Expel has announced the expansion of its managed detection and response (MDR) service to cover email-based threats with new integrations. The company is integrating its MDR platform with Proofpoint, Abnormal Security, and Sublime Security to strengthen protection against phishing, business email compromise (BEC), and other inbox-based attacks. With email remaining a frequent entry point for credential theft, malware installation, and unauthorised access, Expel's enhanced solution aims to identify potential threats earlier in the attack lifecycle. This is intended to help customers reduce risk and improve their security posture with more effective detection and response capabilities. "Identity-based incidents, largely originating from emails, made up 68% of all incidents among Expel customers last year," said Yonni Shelmerdine, Chief Product Officer, Expel. "Incorporating email threat data enables us to identify and block attacks as soon as they hit the inbox, and gives customers insight into the threat actors working to gain access to their organisation. We're delivering the most comprehensive MDR solution in the market, and these capabilities further solidify that commitment while providing our customers with unparalleled visibility and protection across critical attack vectors." The expansion comes at a time when security teams are being challenged by a surge in sophisticated email threats, partly driven by the growth of generative artificial intelligence. This increase has resulted in higher volumes of security alerts, putting additional strain on security resources. Expel has developed its own detections specifically tailored for email security tools and platforms. These proprietary detections are designed to minimise irrelevant alerts and reduce the number of email-based threats that reach end users' inboxes. The company's approach seeks to strengthen early detection and response capability, which is considered a critical factor for organisations aiming to reduce the likelihood and impact of cyber threats. Expel's platform integrates data from various email security providers and combines it with contextual information from endpoints, users, and network activity. This enables the system to uncover the full sequence of email-based attack campaigns and take targeted actions to limit potential damage. Expel continues to build its MDR coverage with what it describes as a technology-agnostic approach, aiming to help customers get more value from existing security investments. The company now offers integrations for over 130 different technology categories, spanning endpoint, cloud, Kubernetes, software-as-a-service, network, SIEM, email, identity, and others. The expanded MDR service is part of Expel's ongoing efforts to address the security risks associated with the most commonly exploited attack vectors in enterprise environments.
Yahoo
25-03-2025
- Business
- Yahoo
Seventh Annual ‘Enterprise Tech 30' List Released by Wing Venture Capital, Focusing on AI-Native Applications and Agentic AI
Further insights: 35% of ET30 companies are Horizontal/Vertical Apps, with over half being AI-native SAN FRANCISCO, March 25, 2025--(BUSINESS WIRE)--The seventh annual Enterprise Tech 30—identifying the most promising private companies across the enterprise technology spectrum—was announced today by Wing Venture Capital in partnership with Eric Newcomer of Newcomer Media. Wing, an early-stage investor and long-term company builder in B2B technology, continues its tradition of curating this definitive industry list spanning enterprise companies at all stages of maturity. This list and accompanying research are the product of a two-phase process to distill a stack-ranked list of the top venture-backed enterprise tech companies and uncover key insights and trends driving the market. Of the 15,000+ venture-backed enterprise tech companies in consideration, 60 companies have been selected as the enterprise tech leaders, segmented by "stage" as determined by an institutional research process. This year, 103 venture capitalists across 86 firms participated in the ET30 list selection process. The group ranged from solo capitalists and seed-stage firms to buyout funds and hedge funds with venture capital practices. The assets under management (AUMs) for the 86 firms ranged from $50 million to $1 trillion. Below is the Enterprise Tech 30 for 2025, categorized into four stages by total capital raised: Early up to $35M Mid between $35M & $150M Late between $150M & $1B Giga $1B and up Browserbase Modal Labs CrewAI Lovable LlamaIndex XBOW Black Forest Labs Pylon Rogo Distyl Unify Orby AI Mimic Krea Clay Decagon Granola Mercor LangChain HeyGen Linear Braintrust MotherDuck Cartesia Tailscale Stackblitz Superhuman Fireworks AI Baseten Cursor (Anysphere) Glean Figma Perplexity ElevenLabs Chainguard Cribl Abnormal Security Canva Vercel Harvey ClickHouse Flock Safety Cognition Island Databricks OpenAI Wiz Anduril Stripe Anthropic SpaceX Ramp Rippling Scale AI Airtable Arctic Wolf Klarna Shield AI Cohesity "The theme for 2025 is the emergence of AI-native applications," said Peter Wagner, founding partner at Wing Venture Capital and creator of the ET30. "The last two years saw the rise of AI models, tools and infrastructure. With those enablers now firmly established, the time has come for agentic applications. Such companies are well represented in this year's ET30, especially in the early stage category." The research process for uncovering the Enterprise Tech 30 also uncovered insights about the state of enterprise tech, including: 35% of ET30 2025 companies are in Horizontal/Vertical Applications, up from 25% in 2023 and 2024, with over half of these being AI-native. 53% of companies (32 of 60) are returning to the ET30, with four companies (Airtable, Canva, Databricks, Stripe) appearing for all seven consecutive years. 50% of all ET30 companies are AI-native this year, representing a dramatic increase from 0% in 2019. Several companies show impressive mobility between stages, with 3 Giga Top 10 companies (Rippling, Scale, Wiz) graduating from late in 2024 to Giga in 2025. The median time since last financing round was less than one year for all stages, with late stage companies at just 0.6 years (down from 2.0 years in 2024), representing a potential shift to quality among venture capitalists. Many companies have launched or announced agentic components in their products, signaling what Wing calls "The Rise of the Agentic Workforce" across the Enterprise Tech 30. For more information on the research methodology, additional insights, and to view the results, visit: About Wing Venture Capital Founded in 2013, Wing works with ambitious founders to enable the AI-first transformation of business. We invest early, before it's obvious, leading Seed and Series A financings and engaging deeply with our signature company-building skills and resources. The current Wing portfolio includes some of today's most important enterprise technology companies such as Snowflake, Cohesity, Pinecone, and Gong. For more information, visit: View source version on Contacts Moxie Communications Groupwing@ Sign in to access your portfolio


Forbes
25-03-2025
- Forbes
Automatic Hacking Machine Uses Millions Of Stolen Passwords To Attack
Atlantis AIO is an automatic hacking machine. getty Don't say you weren't warned. The threat from infostealer malware has been made pretty clear as billions of passwords are reported compromised, 85 million of the newest being used in ongoing attacks, and even two-factor authentication in isolation might not be enough to save you as hackers use session cookies to bypass 2FA code protections. That threat has just been amplified by a report revealing how an automatic hacking machine called Atlantis AIO is using millions of stolen passwords to gain access to email, VPN, streaming services and even food delivery accounts. Credential stuffing is not new; let's make that clear right from the start. However, it is a very dangerous attack methodology and is becoming increasingly so. Attackers are always looking to develop new tools that can help them carry out their attacks, as I reported March 15 after leaked Black Basta ransomware group internal chat logs revealed how it was using an automated brute-force attack framework. As both brute-force and credential stuffing terms suggest, these attacks essentially hammer an account with as many usernames and password combinations as possible in the hope that one will be correct and gain entry. OK, so that's the simplified explanation, but by using lists of stolen or compromised credentials readily available from dark web marketplaces and in various criminal forums, it's possible for hackers to access other accounts that share the same passwords. A March 25 threat intelligence report from Abnormal Security has sounded the alarm about an automatic hacking machine, known as Atlantis AIO, that can take these millions of stolen passwords and use them in just such credential stuffing attacks. 'Atlantis AIO has emerged as a powerful weapon in the cybercriminal arsenal,' Abnormal Security analysts said, 'enabling attackers to test millions of stolen credentials in rapid succession.' Where Atlantis excels, however, is in providing pre-configured modules to automate the targeting of specific services, from email providers such as ing Hotmail, Yahoo, AOL, GMX, and to streaming services, VPNs, financial institutions, and even food delivery services. In fact, the report revealed the Atlantis AIO hacking machine can be aimed at more than 140 different platforms. 'By offering pre-configured modules for targeting a range of platforms and cloud-based services,' the threat intel report warned, 'it allows cybercriminals to launch credential stuffing attacks at scale with minimal effort.' The secret to the success of this automatic hacking machine is its modular approach. This can be demonstrated across three areas. The use of a password manager to ensure unique and strong passwords for every account, along with two-factor authentication for all your accounts, can help mitigate this kind of attack. Don't share your passwords between accounts is the most pertinent advice, follow it.


Axios
14-03-2025
- Business
- Axios
Malware's AI time bomb
Hackers already have the AI tools needed to create the adaptable, destructive malware that security experts fear. But as long as their basic tactics — phishing, scams and ransomware — continue to work, they have little reason to use them. Why it matters: Adversaries can flip that switch anytime, and companies need to prepare now. Driving the news: The looming threat of autonomous cyberattacks was a top talking point at the inaugural HumanX conference in Las Vegas this week. "You know that phrase, 'Keep your powder dry'? That's what attackers are doing right now," James White, chief technology officer at AI security startup CalypsoAI, told Axios, implying that bad actors are ready for battle. The big picture: Cyber leaders have long feared generative AI would enable autonomous cyberattacks, making current security tools ineffective. These attacks could involve AI agents carrying out hackers' bidding or malware that adapts in real time as it spreads. Between the lines: A few years into the generative AI revolution, experts are split on how imminent these threats are. Some say we're less than two years away from seeing agentic malware in nation-state cyber warfare. Others argue hackers have little incentive to change tactics as they continue to profit from simple scams, phishing and ransomware. Threat level: Even though AI-powered malware has yet to flood the zone, companies can't rest easy. "The rate of acceleration is insane," Evan Reiser, CEO of email security company Abnormal Security, told Axios. "You don't have to be a total science fiction nerd, like me, to imagine where this can go in one year, two years." AI will speed up attacks, leaving defenders with little time to react. Meanwhile, most organizations are still behind on basic security measures, Reiser said, noting that the typical company is focused on setting up two-factor authentication. Abnormal Security works with about 20% of the Fortune 500. Reality check: Startups selling AI security tools have an interest in hyping potential threats. Mandiant says it has yet to respond to an attack involving truly autonomous AI or adaptable malware. "I'm actually not worried about any of that right now," Charles Carmakal, CTO at Mandiant, told Axios. Mandiant has mostly seen adversaries using AI for basic tasks like crafting phishing emails or researching targets. The intrigue: Companies hiring cybersecurity vendors are beginning to understand that the best way to fight AI attacks is with AI security tools, said Itai Tevet, CEO of Intezer, a startup that offers an autonomous security operation center. "It's dramatically different between 2023 and today," Tevet told Axios. "In the past, we needed to evangelize on why technology can do the same job. Today, all CISOs are getting asked by their board, 'How do you leverage AI?'" Zoom in: AI agents can also help threat intelligence teams review the pile of notifications they receive about new vulnerabilities, phishing emails and other malicious activity, Steve Schmidt, chief security officer at Amazon, said in a fireside chat with Axios. Amazon currently doesn't let agents make decisions or act on their own, but they can review the threat intelligence coming in to determine what needs to be prioritized. "We've ended up significantly improving the lives of the security engineers, making them more efficient at what they have to do," Schmidt said.