In The News Archive

LightCyber In The News Archive

November 18, 2014 Dark Reading: Deconstructing The Cyber Kill Chain
As sexy as it is, the Cyber Kill Chain model can actually be detrimental to network security because it reinforces old-school, perimeter-focused, malware-prevention thinking. Created by defense giant Lockheed Martin, the term “Cyber Kill Chain” has been widely used by the security community to describe the different stages of cyber attacks. It’s a compelling model, easy to understand… and, let’s face it, the name sounds really cool. >> Read the full article
November 17, 2014 CIO Today: Security experts spot the trends of the year almost past
There is still time for any list of the “top information security issues of 2014” to be rendered obsolete. The holiday shopping season is just getting into high gear, after all, and everybody knows it was from late November to mid-December last year when the catastrophic Target breach occurred. >> Read the full article
November 11, 2014 Geek Time: The JPMorgan Chase breach: Could there be something good?
It’s hard to admit that anything good came out of the recent massive data breach at JPMorgan Chase, which compromised 76 million households and 7 million small business accounts. And the same could be said of the other recent breach disclosures from Target, Home Depot, Albertsons, and almost a dozen financial companies in 2014.The good news is certainly not the millions of dollars the bank will likely be spending over the next few months to repair the damage and restore its reputation. So, what could possibly be good? >> Read the full article
October 17, 2014 Wired: A Silver Lining in the JP Morgan Breach?
The JPMorgan Chase data breach rocked headlines early this month as the latest in a series of breaches hitting nearly a dozen financial companies in 2014 alone. The news also follows similar breach disclosures from Target, Home Depot, Albertsons and others. The massive security breach compromised 76 million households and seven million small business accounts. As a result, the bank will no doubt spend millions of dollars over the next few months repairing the extensive damage and working to restore its reputation. >> Read the full article
October 15, 2014 CIO Today: Sandworm Upstages Typical Patch Tuesday
Microsoft on Tuesday released eight security Relevant Products/Services updates — including three rated critical and five rated important — as part of its monthly cycle. The patches address 24 vulnerabilities in Windows, Office, .NET Framework, ASP.NET, and Internet Explorer (IE). Of course, the big news is still Sandworm. >> Read the full article
September 24, 2014 PYMNTS.com: FDIC’S Gruenberg : Cyber-Threat Defenses Require a ‘Shift In Thinking’
New technologies often bring with them new vulnerabilities, and in this period of rapid innovation, banks’ need to manage the associated operational risks is the most urgent, a top U.S. banking official advised this week.Speaking before the American Banker Regulatory Symposium in Arlington, Va., Martin J. Gruenberg, chairman of the Federal Deposit Insurance Corp. (FDIC), noted in his prepared remarks the growing importance cybersecurity is playing in risk management. >> Read the full article
September 24, 2014 The Christian Science Monitor: Home Depot breach hits 56 million cards. Why do hacks keep happening?
Home Depot announced 56 million of its customers likely had their credit card information stolen in one of the largest data breaches in history. Why do these breaches keep happening, and what is being done to protect your information? >> Read the full article
September 10, 2014 Forbes: Meet The Ex-NSA And Ex-Unit 8200 Spies Cashing In On Security Fears
Before Edward Snowden smashed its digital doors wide open, the National Security Agency was seen as the mysterious keeper of an arsenal of dark-voodoo hacking weapons. Now we know the truth: NSA employees are almost too good at what they do–as are their counterparts at Israel’s elite military signal intelligence group, Unit 8200. >> Read the full article
September 10, 2014 Wall Street Journal: Israeli Cyber Startup LightCyber in $10 Million Funding Round
An Israeli based cyber-security start-up, has raised $10 million in a new funding round led by Battery Ventures.Also participating in the round are existing investors Glilot Capital Partners, which led the company’s previous round, and Marius Nacht, one of the co-founders of Check Point Software Technologies (CHKP). Itzik Parnafes, general partner of Battery Ventures, will join LightCyber’s board of directors. >> Read the full article
September 10, 2014 Fortune: Term Sheet Wednesday September 10
Goldman Sachs put out a research report yesterday titled “Where have all the LBOs gone,” which focused on this year’s dearth of large take-private acquisitions. Basically, there has not been a single U.S. take-private valued at more than $5 billion in 2014, and overall take-privates for U.S. targets has totaled just $3 billion (compared to a $75 billion annual average between 2004 and 2013). Yes, that $3 billion figure feels a low, particularly given that Thoma Bravo just agreed to buy Compuware for $2.5 billion, but clearly there’s been a major slowdown. >> Read the full article
September 10, 2014 TechCrunch: Your Network Is Already Hacked but LightCyber Maybe Be Able to Save You
The Tel Aviv-based security startup LightCyber has some bad news for enterprises — their networks have already been compromised. But the new security technology vendor, which just raised $10 million from Battery Ventures, with additional participation from existing Israeli investors Glilot Capital, and Marius Nacht, the founder of Check Point Software, is selling software that can automate the discovery of holes in corporate defenses and suggest ways to address them. 
>> Read the full article
September 6, 2014 TechCrunch: Why Breach Detection Is Your New Must-Have, Cyber Security Tool
Cyber attacks are all over the news, and it seems like no one is immune — Home Depot, Target, Adobe and eBay included. So why are CIOs still fighting cyber criminals with one hand tied behind their backs? >> Read the full article
September 3, 2014 Pymnts: Lessons Learned From JPMorgan Chase Breach
One of the most troubling lessons from the JPMorgan Chase data breach is that organized cybercrime gangs today are quite good at avoiding the patterns detectable by most security software. “Most of the many millions of dollars spent on cybersecurity are focused on opportunistic attacks — hackers that enter through a security flaw and use common malware to steal information.” >> Read the full article
August 29, 2014 Security Week: Feedback Friday: JPMorgan Targeted in Alleged Russian Cyberattack – Industry Reactions
The attackers, presumably located in Russia, are said to have stolen large amounts of sensitive data from the systems of the targeted organizations. The level of sophistication indicates that the cyberattacks could be the work of a foreign government, and the FBI is reportedly trying to determine if the incidents are a form of retaliation for the sanctions against Russia over its support of rebels in Ukraine. >> Read the full article
August 29, 2014 VentureBeat: JP Morgan’s security breach points to broader issues in cyber security
Recent revelations surrounding hacker attacks infiltrating JPMorgan Chase & Co. leave questions about why we’re seeing an increasing number of successful attacks on major institutions. It turns out that protecting an institution full of personally identifiable information is more complex than just having a good cybersecurity team. >> Read the full article
August 29, 2014 Popular Science: Why Are Israeli Startups Leading The Tech World?
People lined both sides of Boylston Street, rounds of cheers going up as runners approached the end of the 2013 Boston marathon. Then white smoke plumed. Windows splintered. Fifteen seconds later, another explosion, and glass shattered onto blackened cement. The detonations knocked athletes to the ground, in some cases blowing the shoes off their feet. Three people died, and another 264 were injured. >> Read the full article
August 13, 2014 Diplomacy: LightCyber Unveils Second Generation Magna Platform Unifying Network and Endpoint Analysis into a Single Detection Engine
LightCyber, a leading provider of advanced breach detection solutions, today unveiled a new generation of its award-winning solution, LightCyber Magna. The new generation is the first product to combine network and endpoint analysis into a single real-time detection platform, making it easier than ever for organizations to quickly and cost effectively identify and mitigate attacks. >> Read the full article
August 7, 2014 Time: Off the Battlefield, Hackers Are Waging Cyberwar Against Israel and Palestine
Fighting in the Gaza Strip hit a lull this week as a 72-hour cease-fire ends its third and final day Thursday — but a digital war has still been raging as hackers pay little mind to the temporary truce. Cyberattacks directed against Israel have increased dramatically since it invaded Gaza in early July, intensifying last month as the violence peaked, according to a report released this week by the security research firm Arbor Networks. >> Read the full article
August 6, 2014 CBR Online: 8 Biggest Hacks in the first half of 2014
Cyber security has never been more important for more companies than now, and the first half of 2014 has only served to demonstrate that fact. As we’re now deep into summer we thought it would be a good time to revisit the biggest hacks of this year. Well, so far, anyway. 
>> Read the full article
August 4, 2014 Network World: New products of the week
Our roundup of intriguing new products. >> Read the full article
August 1, 2014 Channelnomics: Network and Endpoint Analysis Combine in Single Detection Engine
This week in On Point we look into new product announcements including those from RackWare, Barracuda Networks, LightCyber and Continuity Software. Cloud-based Disaster Recovery Aimed at Physical, Virtual Workloads. >> Read the full article
July 30, 2014 Israel 21c: The derring-do of LightCyber CEO Gonen Fink
Gonen Fink made a daring career move after 12 groundbreaking years at Israel’s renowned Check Point Software Technologies. He founded Pythagoras Solar, an innovator of power-generating, energy-efficient windows. Though Pythagoras won international attention and awards, the idea proved to be ahead of its time. Fink put the window on the back burner, dissolved the company and joined LightCyber, an Israeli company founded in 2011 to provide a new approach to protecting against cyber breaches. >> Read the full article
July 21, 2014 Intelligence Community News: LightCyber debuts new Magna platform to unify network and endpoint analysis
LightCyber, a provider of advanced breach detection solutions, unveiled on July 31 a new generation of its award-winning solution, LightCyber Magna. The new generation is the first product to combine network and endpoint analysis into a single real-time detection platform, making it easier than ever for organizations to quickly and cost effectively identify and mitigate attacks, says the company. >> Read the full article
July 10, 2014 Information Week: Will smart cities power the future of cybercrime and mass surveillance?
Hackers breached a server in the State of Montana’s Department of Public Health and Human Services, prompting officials to notify 1.3 million people of the incident. >> Read the full article
July 1, 2014 VPN Haus: Government Network Security Failures Led to Remote Access Breaches
As technology advances, the number of cyber-attacks on both public and private networks also increases. According to the Washington Post, in 2013 alone, more than 3,000 enterprises were notified of system hacks that had the potential to expose sensitive information and powerfully damage their brands. >> Read the full article
June 26, 2014 InformationWeek: Montana Health Department Hacked
Hackers breached a server in the State of Montana’s Department of Public Health and Human Services, prompting officials to notify 1.3 million people of the incident. >> Read the full article
June 26, 2014 WatchDogWire: OOPS! Montana Health Department Hacked Last year, just now notifying patients
Are your electronic medical records secure? Here’s another reason to worry about data security. Montana Health Department officials are notifying 1.3 million people that their sensitive information, including social security numbers and medical records, may have been exposed to hackers last July. >> Read the full article
June 11, 2014 Dark Reading: Experts: CrowdStrike China Hacker Report Raises Red Flags For Business
The release of another report on state-sponsored hacking activities in China earlier this week should remove all doubt: The intellectual property of Western enterprises is being targeted for data theft. >> Read the full article
May 29, 2014 Business Insider: The Most Influential Israelis In Tech Worldwide
By now we’ve all probably heard of the startup scene that is flourishing in Israel, or the Startup Nation. After finishing up their army service, many young Israelis go on to make waves in the tech world, often setting roots in Tel Aviv. >> Read the full article
March 20, 2014 Financial Times: Israel makes headway in cyber security
In a quiet corner of an Israeli farming village, Tanya sites at her computer and chats online wiht some of the most skilled hackers in cyber space. >> Read the full article
February 21, 2014 CRN: 10 Innovative Security Startups To Watch In 2014
Light Cyber uses behavioral analytics to detect and alert on malicious activity early in an attack life cycle. The company analyzes network and endpoint information and profiles normal behavior of network users and their devices to spot suspicious behavior. Its Magna network monitoring appliance uses deep packet inspection to profile users and their behavior on the corporate network and alerts on subtle behavior deviations.  >> Read the full article
January 30, 2014 Government Technology: Look to Israel for new cybersecurity ideas, innovation, partnerships and inspiration
On Monday, January 27, Prime Minister Benjamin Netanyahu took the stage as the opening keynote speaker at the CyberTech 2014 conference in Tel Aviv, Israel. However, the words that he said and the conference which he lead, offered a vital message to the public and private sectors in the USA and around the world. Federal, state and local governments need to pay attention to the remarkable accomplishments unfolding on the other side of the world. >> Read the full article
January 9, 2014 BBC News Technology: Yahoo malware enslaves PCs to Bitcoin mining
Adverts on Yahoo’s homepage were infected with malware designed to mine the Bitcoin virtual currency, according to security experts. Yahoo confirmed that for a four-day period in January, malware was served in ads on its homepage.Experts estimate that as many as two million European users could have been hit. >> Read the full article
January 9, 2014 VentureBeat Technology: Yahoo ad malware enslaved PCs to nonconsensual Bitcoin mining
On Monday, we told you about the rogue actor who inserted malware into Yahoo ads. Now we’re hearing that after worming its way onto PCs, the malware attempted to steal their computational resources to mine Bitcoins, according to security firm Light Cyber. >> Read the full article
January 9, 2014 CNET: Yahoo malware turned PCs into Bitcoin miners
The cybercriminals who infected the computers of European Yahoo users apparently wanted to create a huge Bitcoin network. Researchers at security firm Light Cyber revealed this week that one of the malware programs aimed to use the resources of infected PCs to perform the calculations necessary to run a Bitcoin network. Reported earlier this month by fellow security firm Fox IT, the campaign spread its package by using Yahoo’s ad server to deploy malicious ads. The malware took advantage of vulnerabilities in Java to install itself on computers that visited the ads.yahoo.com site. >> Read the full article
January 9, 2014 The Washington Post: The Switchboard: This woman stood up to the FBI’s backdoor request—and won
Yahoo malware enslaves PCs to Bitcoin mining. “Adverts on Yahoo’s homepage were infected with malware designed to mine the Bitcoin virtual currency, according to security experts,” the BBC reports. “Security firm Light Cyber said the malware was intended to create a huge network of Bitcoin mining machines.” >> Read the full article
January 8, 2014 The Guardian: Yahoo malware turned European computers into bitcoin slaves
According to Light Cyber, a security research firm which warned Yahoo of the attacks in late December, one of the malware programs delivered in the attack turned the victim’s computer into a bitcoin miner. The computer is set to work performing the calculations required to make the bitcoin network run, but the rewards for doing so accrue to the malware writer. >> Read the full article
March 14, 2013 SecurityWeek: Security Startups: In Focus With Light Cyber Co-Founder and CEO Giora Engel
My security background started in the military. If you look at other Israeli companies that focus on security, such as Checkpoint and Imperva, you can see that many of the entrepreneurs began their security career in the military. We have that advantage where the ideas originate in the military and at a later stage we can implement them in a different manner to fit the industry needs. Essentially, we get to know the technology ten years before they reach the industry. >> Read the full article

Return to “In the News” page »