© 2022 CyberNews - Latest tech news,
product reviews, and analyses.

If you purchase via links on our site, we may receive affiliate commissions.

Changming Liu, Stellar Cyber: hackers target remote workers to obtain access to corporate networks


With the pandemic and the stay-at-home orders that came with it, hackers started increasingly attempting to exploit the situation and damage businesses that operate remotely.

When it comes to enterprises, it is common to cut corners in terms of cybersecurity as not many are aware of the consequences. In reality, there are various cyber threats, such as ransomware and phishing attacks, that can severely impact a business. Some of the outcomes include a ruined reputation or major loss of money.

That is why various threat prevention measures, such as open detection and response (Open-XDR) security platforms, exist.

For this reason, to discuss cybersecurity and cyberattack prevention, we had a talk with Changming Liu, the CEO and Co-Founder of Stellar Cyber, a company that offers a security platform created to identify and remove threats.

Tell us a little bit about your history. How did Stellar Cyber originate?

Stellar Cyber was founded in 2015 by Aimei Wei and myself. I am the CEO of Stellar Cyber and have also previously founded companies like Aerohive and Trustgo. I was an early employee and a key architect at Netscreen, which was acquired by Juniper for $4 billion back in 2004. Aimei Wei, who is the CTO of Stellar Cyber, has worked for both early-stage startups (Nuera, SS8 Networks, and Kineto Wireless) and well-established companies, including Nortel, Ciena, and Cisco.

Aimei knew first-hand the frustration security analysts have to deal with when trying to combat cyber threats with collections of stand-alone tools. Analysts must manually correlate alerts from various tools to see the full picture of evolving cyberattacks, however, the volume of such alerts makes it nearly impossible for them to do so. Aimei’s idea was to build a central console with core cybersecurity capabilities that could ingest and correlate data from other stand-alone tools to provide a 360-degree view of the threat landscape.

Can you tell us a little bit about what you do? What issues do you mainly focus on?

The Stellar Cyber Open XDR Platform solves the problem of siloed security tools by ingesting data from its own and third-party tools to present a complete picture of evolving cyber threats while protecting existing investments in other security tools. Stellar Cyber’s platform was the first Open XDR solution. Not only does it ingest data, but it also automatically correlates and analyses it. Then, it offers contextual, prioritized incidents with recommendations for how analysts can address them.

What types of technology do you use to detect threats before it is too late?

Stellar Cyber’s platform incorporates AI and machine learning to evaluate alerts from disparate tools and group them into incidents. The platform also includes NDR (network detection and response), next-generation SIEM (security incident and event management), and TIP (a threat information platform) to monitor network traffic and evaluate security incidents. It integrates with any EDR to add to investment protection and ensure everything, detection and response. The software can be deployed anywhere, with a single license, making it ideal for teams that typically can not afford to hire an army of security analysts.

How do you think the pandemic influenced the ways in which threat actors operate?

With many employees working from home, attack possibilities for hackers increased significantly. They are now more likely to target remotely working employees’ computers to obtain access to corporate networks.

In the age of frequent cyberattacks, do you think small businesses and big enterprises should rely on the same security measures?

Yes, but the way they go about using those measures is different. Enterprises can afford a staff of security analysts and will use security tools and an XDR platform to manage threats. Small businesses can’t afford teams of analysts or the most sophisticated security tools, so they should work with an MSSP (managed security services provider) to offload the security function. Many MSSPs use Stellar Cyber’s Open XDR platform as the core of their offerings.

As XDR solutions are starting to gain popularity, some still might not be familiar with this topic. Could you briefly explain how is it different from traditional detection and response?

Traditional detection and response involve analysts chasing threats without proper context. An analyst might use several different tools that report security alerts, and then he or she must chase down those alerts one at a time. Often, analysts miss sophisticated attacks because they are reported as relatively benign incidents in several different tools. So the analyst can’t effectively correlate those incidents to see the big picture.

Stellar Cyber’s Open XDR platform automatically correlates data from multiple tools, groups related alerts, and then reports contextual incidents that can be immediately acted upon.

With remote work becoming the new normal, what are some of the worst cybersecurity habits that can lead to serious attacks or breaches?

One of the worst habits is clicking on links in emails. It can lead to falling victim to phishing attacks, which are a common way of installing malware on a device. Users should always make sure that the sender’s domain-based email matches the content of the email. For example, the domain [email protected] is similar but doesn’t match the name of the actual company, which is Lifelock.com. Text messages have the same issue, and users need to remember that large vendors like AT&T or Bank of America never send texts about account blocking or giveaways.

Remote workers should use virtual private network (VPN) connections to secure and encrypt traffic between their systems and the corporate network. Otherwise, the traffic is open to snooping and login passwords are vulnerable.

Many remote workers forget about maintaining adequate backup and recovery systems. Backups are critical for recovering data in case of a breach. Enterprises should train all of their workers about these techniques, and they should adopt XDR security systems to protect against breaches based on the behavior summarized above.

What new threats do you think the public should be ready to take on in the next few years? What security tools should be implemented?

Siloed security tools look at individual “trees” in the forest rather than the whole forest. Hackers will always look to get in between the trees. XDR systems look across tools and block hackers’ newer strategies. Machine Learning (ML) adds context, so while seemingly authentic transactions alone may look legitimate, when observing the context as a cluster of events, analysts can see the “forest” to spot complex, multi-layered attacks.

Hackers continue to advance and so will XDR thinking. Hackers will get a deeper understanding of applications, hardware, and data that defines who we are. XDR will continue to advance as well by making the existing protection improved through better intelligence and by advancing AI and Big Data sciences purpose-built for cybersecurity.

Share with us, what’s next for Stellar Cyber?

Stellar Cyber recently completed a $38 million Series B funding round that included Samsung, Highland Capital Partners, and all existing investors because the company has demonstrated its leadership in the XDR markets with 3x year-over-year growth and nearly 1,000 customers globally. Cyberattacks are continually becoming more numerous and sophisticated, and with its platform, Stellar Cyber continues to innovate to offer the most comprehensive solution to this threat. The combination of accelerated migration to the cloud and the need to provide security for remote workers is increasing the demand for more powerful and streamlined solutions. As the enterprise security industry matures, Stellar Cyber is going to be a leader in the $20 billion XDR market.


Leave a Reply

Your email address will not be published. Required fields are marked