Security News > 2020 > July

Based on the data, the report entitled "The State of the Security Team: Are Executives the Problem?" found that 75% of the respondents said they have more work stress now than two years ago. Among the respondents, 93% said they lack the tools needed to detect known security threats, 68% said they have overlapping security solutions, and 56% admitted that this security solution overlap is unplanned.

Expert suggests universities take extra care to prevent attacks while students are learning from home. TechRepublic's Karen Roby spoke with Carlos Morales of VP and general manager of DDoS Security Services at NetScout Systems, which provides application and network performance management products, about security concerns with remote learning at universities.

Expert suggests universities take extra care to prevent attacks while students are learning from home.

The Atlantic Council has a released a report that looks at the history of computer supply chain attacks. Deep Impact from State Actors: There were at least 27 different state attacks against the software supply chain including from Russia, China, North Korea, and Iran as well as India, Egypt, the United States, and Vietnam.

Source code belonging to tens of companies, including several major organizations, has been leaked online after it was found on unprotected DevOps infrastructure. Kottmann told SecurityWeek that the source code they've made public, much of which appears to be proprietary, mostly comes from improperly configured or exposed DevOps infrastructure.

In a joint alert this week, the United States and the United Kingdom warned that a piece of malware has infected over 62,000 QNAP network-attached storage devices. "Due to these data breach concerns, QNAP devices that had been infected may still be vulnerable to reinfection after removing the malware," the company said.

Facebook on Monday said it is asking EU courts to review "Exceptionally broad" requests by antitrust regulators there that would scoop up employees' personal information. The US-based internet colossus maintained it has been cooperating with a European Commission antitrust investigation and will continue to do so, but that the wording of commission requests casts a net so wide it will haul in Facebook employees' private messages and more.

There are approximately 62,000 malware-infested QNAP NAS devices located across the globe spilling all the secrets they contain to unknown cyber actors, the US CISA and the UK NCSC have warned. Dubbed QSnatch, the sophisticated malware targets QTS, the Linux-based OS powering QNAP's NAS devices, and is able to log passwords, scrape credentials, set up an SSH backdoor and a webshell, exfiltrate files and, most importantly, assure its persistence by preventing users from installing updates that may remove it and by preventing the QNAP Malware Remover app from running.

Find out this week: How to build a cyber threat intelligence program while cutting through the noise
The advantages of having decent threat intelligence in place are many and various, as the threat landscape continues to widen year-on-year. The problem, as with any complex big-data project, is cutting through the inevitable data deluge to correctly identify the bits you need - the people, places, technology, and other moving parts to build the picture.

Now that so many of us are covering our faces to help reduce the spread of COVID-19, how well do face recognition algorithms identify people wearing masks? The answer, according to a preliminary study by the National Institute of Standards and Technology, is with great difficulty. Identify people wearing masks using facial recognition algorithms.