Security News > 2020 > October

Researchers Find Vulnerabilities in Microsoft Azure Cloud Service
2020-10-08 06:56

Now according to the latest research, two security flaws in Microsoft's Azure App Services could have enabled a bad actor to carry out server-side request forgery attacks or execute arbitrary code and take over the administration server. Azure App Service is a cloud computing-based platform that's used as a hosting web service for building web apps and mobile backends.

Number of corporate credentials exposed on the dark web increased by 429%
2020-10-08 04:30

While there has been a year-over-year decrease in publicly disclosed data breaches, an Arctic Wolf report reveals that the number of corporate credentials with plaintext passwords on the dark web has increased by 429 percent since March. For a typical organization, this means there are now, on average, 17 sets of corporate credentials available on the dark web that could be used by hackers.

Review: Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk
2020-10-08 04:30

The author starts off by explaining vulnerability management basics, the importance of knowing your network and the process of collecting and analyzing data. He explains the importance of a vulnerability scanner and why it is essential to configure and deploy it correctly, since it gives valuable infromation to successfully complete a vulnerabilty management process.

Only 27.9% of organizations able to maintain compliance with the PCI DSS
2020-10-08 04:00

With many companies struggling to retain qualified CISOs or security managers, the lack of long-term security thinking is severely impacting sustained compliance within the Payment Card Industry Data Security Standard. Additional findings shine a spotlight on security testing where only 51.9 percent of organizations successfully test security systems and processes as well as unmonitored system access and where approximately two-thirds of all businesses track and monitor access to business critical systems adequately.

One-fifth of organizations did not make cybersecurity a priority during the pandemic
2020-10-08 03:30

56% of IT and OT security professionals at industrial enterprises have seen an increase in cybersecurity threats since the start of the COVID-19 pandemic in March, a Claroty research reveals. Cybersecurity still not a priority, regardless of the pandemic 32% said their organization's OT environment is not properly safeguarded from potential threats.

Securing mobile devices, apps, and users should be every CIO’s top priority
2020-10-08 03:00

The current distributed remote work environment has also triggered a new threat landscape, with malicious actors increasingly targeting mobile devices with phishing attacks. Mobile Molly Works constantly on the go using a range of mobile devices, such as tablets and phones, and often relies on public WiFi networks for work.

Save on CCSP self-paced exam prep when bundled with exam voucher
2020-10-08 02:30

Now’s your time to become recognized as a globally respected cloud expert and catapult your career with the (ISC)² Certified Cloud Security Certification (CCSP). To help you confidently prepare...

eero for Service Providers: Helping ISPs enhance customer home WiFi experience
2020-10-08 02:00

Eero introduced eero for Service Providers-an all-new premium hardware and software offering designed specifically to help internet service providers meet customers' increasing demands for exceptional home WiFi. Beginning this November, eero for Service Providers will bring together real-time, actionable insights, advanced security measures and whole-home mesh WiFi systems to help ISPs offer fast, reliable WiFi and create new opportunities to improve the customer experience.

Datadog adds Deployment Tracking to its APM to prevent outages related to bad code deploys
2020-10-08 01:30

Datadog announced Deployment Tracking, a new feature for Datadog APM. This feature enables engineering teams to identify when new code deployments are the root cause of performance issues. To prevent such risky visibility gaps, Datadog Deployment Tracking visualizes key performance metrics such as requests per second and error rate, identifying new error types for specific endpoints during every code deployment.

Red Hat launches Red Hat Accelerators, an enterprise customer advocacy program
2020-10-08 01:00

Red Hat announced the introduction of its enterprise customer advocacy program, Red Hat Accelerators. Red Hat Accelerators offers peer-to-peer networking with like-minded Red Hat practitioners to foster deeper learning and broaden exposure to various products, technologies, use cases and issues along with group discussions on features and functions.