Distil Releases Free Google Analytics Plug-in, Google Launched Malware Scanner For Android Devices and More in This Week’s News

4 Min read

Distil’s Free Plug-in for Google Analytics Will Clean Up Bot Data

One of the market leaders in bot protection, Distil Networks announced the release of their latest product, a Google Analytics plugin. The new product is a free plugin that helps weed out bad bot data from GA.

Reduce your AWS costs by over 50%

Discover your Cloud Saving Potential – Answer just 5 simple questions. AppsFlyer, Playtika, Lufthansa, IBM, top leading companies are already using our FinOps services.

Reduce your AWS costs by over 50%

The new tool comes as a courtesy by Distil who also announced the purchase of Are You a Human technology. The easy-to-set-up tool, named Bot Discovery for Google Analytics, uses human detection technology to identify bots and then forwards data to GA. That way users can have cleaner reports and better data about important metrics.

The acquisition of Are You a Human technology will further strengthen Distil Network’s position as the leader in bot mitigation. The acquisition will also imply new job and office openings in Detroit along with more plans for expanding the workforce.

Read More:

Bizety, Distil Networks

Google Launches New Malware Scanner To Keep Android Devices Safe

The tech giant is well aware that keeping users safe is crucial in maintaining their trust. For that matter, Google launched a new security solution for Android devices. Google Play Protect is a new product whose sole purpose is to keep its billions of users safe.

Google Play Protect will be integrated as a part of the Google Play Store app. It leverages machine learning and app usage analysis to spot and eliminate apps that demonstrate malicious behavior.The app comes with the Google Play Store, which means users won’t have to install or activate it separately. Play Protect for Android’s main features:

  • Anti-Theft Measures
  • App Scanning
  • Browser Protection

The service will be made available for Android users over the coming month.

Read More:

Hacker News, Google Blog

Analyst Expects Cloud Sales To Decelerate

According to predictions by Mehdi Hosseini, analyst at Susquehanna, cloud computing is already an established technology and its adoption is set to slowdown like other IT sectors.

Hosseini predicts the deceleration trend as well as an increased interest about open-source architectures. The predictions also involve a cut on previous expectations on cloud sales but will still result a significant YoY growth. Hosseini claims it’s mostly due to a slow market saturation which will persist until 5G cellular infrastructure is available (expected in 2020-21).

The analyst also suggests that the new trends will result in more acquisitions and mergers by cloud service suppliers in order to consolidate their market share.

Read More:

Cloud Pro

Researcher Discovers New Strain of Malware Powered by NSA Hacking Tool

Miroslav Stampar, a Croatian security researcher, discovered a new type of malware which spreads by leveraging Windows SMB file sharing flaws. Unlike WannaCry and similar strains, which use a combination of 2 leaked NSA hacking tools, the new strain uses all seven. Last week, Hacker News reported about multiple cyber criminal organisations using the NSA tools but almost all of them were using EternalBlue and DoublePulsar.

Known as EternalRocks, the new network worm is considered more dangerous and, unlike WannaCry, has no kill-switch. The malware is cunningly built to operate in secrecy to avoid detection. EternalRocks, which Stampar refers to as “DoomsDayWorm” uses all seven leaked NSA tools:

  1. EternalBlue — SMBv1 exploit tool
  2. EternalRomance — SMBv1 exploit tool
  3. EternalChampion — SMBv2 exploit tool
  4. EternalSynergy — SMBv3 exploit tool
  5. SMBTouch — SMB reconnaissance tool
  6. ArchTouch — SMB reconnaissance tool
  7. DoublePulsar — Backdoor Trojan

The researcher also found that the malware disguises itself as WannaCry to fool researchers. Then, instead of deploying ransomware, it infects the machine and awaits command for future cyber attacks.

Read More:

Hacker News, GitHub

Breach at DocuSign Led to Targeted Email Malware Campaign

Last week DocuSign admitted that their users’ leaked data was used to launch a malware phishing attack. After a data breach at one of their system centers, hackers gained access to user email addresses and launched an email malware campaign. San Francisco-based provider of electronic signature technology, warned that they were following a suspicious email campaign where the subject line was “Completed: docusign.com – Wire Transfer Instructions for recipient-name Document Ready for Signature”. The message then contained a link to a Microsoft Word document hiding malware.

As part of our ongoing investigation, today we confirmed that a malicious third party had gained temporary access to a separate, non-core system that allows us to communicate service-related announcements to users via email. A complete forensic analysis has confirmed that only email addresses were accessed; no names, physical addresses, passwords, social security numbers, credit card data or other information was accessed. No content or any customer documents sent through DocuSign’s eSignature system was accessed; and DocuSign’s core eSignature service, envelopes and customer documents and data remain secure.”

DocuSign wrote in an alert

The company is asking people to forward any suspicious emails related to DocuSign to spam@docusign.com, and then to delete the message.

Read More:

Krebs On Security, DocuSign

Latest Articles

Justt – IaC

Justt is a chargeback mitigation startup based in Tel Aviv. Chargebacks, as defined, are demands by a credit card provider for a retailer to reimburse losses on fraudulent or disputed transactions. Justt’s objective is to assist merchants worldwide in combating false chargebacks using its proprietary artificial intelligence technology.

22nd February, 2024
8 FinOps Best Practices for Cutting Cloud Costs

The cloud used to be viewed as a place of significant cost savings: rather than purchasing and maintaining dozens of server stacks, organizations could outsource this and purchase compute power on an as-needed basis. In the ensuing rush to cloud architecture, however, many companies simply lifted-and-shifted their old financial bad habits. The sheer speed of […]

22nd February, 2024
How FinOps Capabilities Can Unlock Your Cloud Cost Goals

Cloud computing has transformed more than individual app architectures: it’s granted both start-ups and market leaders an equal platform for innovation. New products are no longer dependent upon complex revenue-draining in-house server stacks. Instead, cloud-native disruptors such as Uber and Airbnb have been able to harness the once-unthinkable degrees of agility, scalability, and cost-efficiency that […]

24th January, 2024

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.

Unlock Your Cloud Potential