Security News > 2020 > September

Due to the nature of cyber-physical systems, incidents can quickly lead to physical harm to people, destruction of property or environmental disasters. The funcion of CPSs. CPSs are defined as systems that are engineered to orchestrate sensing, computation, control, networking and analytics to interact with the physical world.

GuidePoint Security released a new open source tool that enables a red team to easily build out the necessary infrastructure. The RedCommander tool solves a major challenge for red teams around the installation and operationalization of infrastructure by combining automation scripts and other tools into a deployable package.

84% of security and IT leaders feel their enterprise programs are mature, but a deeper dive reveals a major disconnect between perception and reality, Vulcan Cyber reveals. "Given the amount of breaches caused by known, unpatched vulnerabilities, that reveals a surprising disconnect that merits a closer look. So we mapped the survey data to our maturity model - the only way to raise the bar for vulnerability management is to show IT leaders how to transition their programs from managing vulnerabilities to remediating them."

Despite COVID-related supply and demand disruptions, customers deployed more data center ethernet switches in the first half of 2020 than they did in the same year-ago period, according to Crehan Research. The hyperscale cloud service provider's contribution was reflected in the especially strong growth of 100 gigabit ethernet and 25GbE - a preferred data center networking architecture within this customer segment.

Anyone paying attention to the cybersecurity technology market has heard the term XDR - Extended Detection and Response. Why is XDR receiving all the buzz? Combining security technologies in a usable manner has become the bane of cybersecurity as technology spread has overwhelmed the space.

A Chinese threat actor was observed targeting both European diplomatic entities and the Tibetan community with the same strain of malware. In a report published Wednesday, Proofpoint's security researchers revealed a link between COVID-19-themed attacks impersonating the World Health Organization to deliver the "Sepulcher" malware to economic, diplomatic, and legislative entities within Europe and attacks on the Tibetan community that delivered LuckyCat-linked malware and ExileRAT. Furthermore, a July campaign targeting Tibetan dissidents was attempting to deliver the same Sepulcher malware from the same infrastructure, with some of the employed email addresses previously used in attacks delivering ExileRAT, suggesting that both campaigns are the work of TA413.

Anyone paying attention to the cybersecurity technology market has heard the term XDR - Extended Detection and Response. XDR is a new technology approach that combines multiple protection technologies into a single platform.
Networking equipment maker Cisco has released a new version of its Jabber video conferencing and messaging app for Windows that includes patches for multiple vulnerabilities-which, if exploited, could allow an authenticated, remote attacker to execute arbitrary code. Two of the four flaws can be exploited to gain remote code execution on target systems by sending specially crafted chat messages in group conversations or specific individuals.

Offensive Security introduced new products to the Proving Grounds family of training labs - PG Play and PG Practice. The new labs are designed to allow security and IT professionals to learn hacking techniques, sharpen their security and pentesting skills, and get a sense of the experience of being enrolled in OffSec's sought-after certification programs.

When you own a short email address at a popular email provider, you are bound to get gobs of spam, and more than a few alerts about random people trying to seize control over the account. If your account name is short and desirable enough, this kind of activity can make the account less reliable for day-to-day communications because it tends to bury emails you do want to receive.