Security News > 2020 > June

Cybersecurity, remote IT troubleshooting and cloud support will be the most sought-after skills for businesses in the months following the COVID-19 pandemic, according to a survey of CIOs and tech executives. In a survey of IT leaders from companies including Deloitte, Citi, Microsoft and Salesforce, 98% said cybersecurity talent would be "Extremely important" to businesses over the next six to 18 months as they entered the next phase of recovery from global lockdowns.

Cybersecurity researchers from Cisco Talos unveiled today that it discovered two critical vulnerabilities in the Zoom software that could have allowed attackers to hack into the systems of group chat participants or an individual recipient remotely. According to the researchers, successful exploitation of both flaws requires no or very little interaction from targeted chat participants and can be executed just by sending specially crafted messages through the chat feature to an individual or a group.

Cybersecurity researchers from Cisco Talos unveiled today that it discovered two critical vulnerabilities in the Zoom software that could have allowed attackers to hack into the systems of group chat participants or an individual recipient remotely. According to the researchers, successful exploitation of both flaws requires no or very little interaction from targeted chat participants and can be executed just by sending specially crafted messages through the chat feature to an individual or a group.

Private equity investment company Thoma Bravo on Tuesday announced its intention to acquire secure business collaboration solutions provider Exostar, reportedly for roughly $100 million. Exostar provides supply chain collaboration and management, identity access management, risk management, and secure collaboration solutions for highly regulated industries such as healthcare, aerospace and defense, and life sciences.

Best corporate blog: Naked Security Legends of security - Best overall blog: Naked Security. Thanks to all of you who took the trouble to vote for us - we really appreciate it, because you're the Naked Security community that makes it all worthwhile.

The Tor Project this week rolled out an update to its browser that attempts to make the anonymity-protecting onion routing scheme more approachable. The Tor Project itself emerged from federally funded research led by the US Office of Naval Research and DARPA. Tor is an acronym for the original name of the project, The Onion Router, an encrypted networking protocol designed to support anonymous communication - although paradoxically a popular website for Tor users is Facebook.

A new set of critical vulnerabilities uncovered in SAP's Sybase database software can grant unprivileged attackers complete control over a targeted database and even the underlying operating system in certain scenarios. A second vulnerability concerns ASE Cockpit, a web-based administrative console that's used for monitoring the status and availability of ASE servers.

A new set of critical vulnerabilities uncovered in SAP's Sybase database software can grant unprivileged attackers complete control over a targeted database and even the underlying operating system in certain scenarios. A second vulnerability concerns ASE Cockpit, a web-based administrative console that's used for monitoring the status and availability of ASE servers.

Within 5G networks, we see strong continued investment across a variety of areas such as 5G RAN, 5G Core Network), increased virtualization and cloudification of network cores, and mobile edge networks. Looking at initial launches, what do you see as the biggest 5G network deployment challenges?

Cloudbric has introduced an alternative to traditional VPNs, that monitors and blocks unusual and malicious access. The company utilized its award-winning cybersecurity technology to develop a remote access solution that provides a cloud-based, secure channel for remote access while blocking out hack attempts, malware, malicious bots, intrusions originating from black IPs, and even DDoS attacks.