Endpoint

1/3/2018
10:38 AM
50%
50%

Barracuda Hooks PhishLine in Social Engineering Security Acquisition

Barracuda plans to use PhishLine's user awareness training to protect against targeted email-based attacks.

Barracuda Networks has acquired PhishLine, a SaaS platform for social engineering simulation and training, the company announced today. The cloud security company plans to add PhishLine's tech to its security portfolio to protect against email-based targeted attacks.

Email is a prime target for attackers but difficult to protect because security relies on the human factor. Barracuda's acquisition is intended to address the social engineering threat as attacks become increasingly targeted. In addition to user awareness training, PhishLine provides data analytics and reporting for users to measure risk of both people and processes.

Barracuda has generated a wave of M&A news in recent months as it buckles down on cloud security. Last November, it purchased Sonian for cloud archiving and email security; shortly after, it expanded public cloud functionality for its Web Application Firewall and NextGen Firewall. Later the same month, it was acquired by private equity firm Thoma Bravo for $1.6B.

Read more details here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
The Fundamental Flaw in Security Awareness Programs
Ira Winkler, CISSP, President, Secure Mentem,  7/19/2018
Mueller Probe Yields Hacking Indictments for 12 Russian Military Officers
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/13/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Hey, I don't make the rules: You get 3 virtual wishes.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14449
PUBLISHED: 2018-07-20
An issue was discovered in libgig 4.1.0. There is an out of bounds read in gig::File::UpdateChunks in gig.cpp.
CVE-2018-14450
PUBLISHED: 2018-07-20
An issue was discovered in libgig 4.1.0. There is an out-of-bounds read in the "update dimension region's chunks" feature of the function gig::Region::UpdateChunks in gig.cpp.
CVE-2018-14451
PUBLISHED: 2018-07-20
An issue was discovered in libgig 4.1.0. There is a heap-based buffer overflow in the function RIFF::Chunk::Read in RIFF.cpp.
CVE-2018-14452
PUBLISHED: 2018-07-20
An issue was discovered in libgig 4.1.0. There is an out-of-bounds read in the "always assign the sample of the first dimension region of this region" feature of the function gig::Region::UpdateChunks in gig.cpp.
CVE-2018-14453
PUBLISHED: 2018-07-20
An issue was discovered in libgig 4.1.0. There is a heap-based buffer overflow in pData[1] access in the function store16 in helper.h.