Security News > 2020 > November

Businesses increasingly embrace the moving of multiple applications to the cloud using containers and utilize Kubernetes for orchestration, according to Zettaset. While many companies are eager to adopt these new cloud-native technologies, research shows that companies are not accurately weighing the benefits of enterprise IT innovation with inherent security risks.

Chen Ku-Chieh, an IoT cyber security analyst with the Panasonic Cyber Security Lab, is set to talk about the company's physical honeypot and about the types of malware they managed to discover through it at HITB CyberWeek on Wednesday. The use of IoT is increasingly widespread, from home IoT, office IoT to factory IoT, and the use of automation equipment is increasing.

Switzerland benefitted from a spectacular espionage scheme orchestrated by the CIA and its German counterpart who used a Swiss encryption company to spy on governments worldwide, a parliamentary probe showed Tuesday. A large media investigation revealed back in February an elaborate, decades-long set-up, in which US and German intelligence services creamed off the top-secret communications of governments through their hidden control of the Crypto encryption company in Switzerland.

Nuspire released a report, outlining new cybercriminal activity and tactics, techniques and procedures throughout Q3 2020, with additional insight from Recorded Future. Malware campaigns, like Emotet, utilized these events as phishing lure themes to assist in delivery.

Academics at UCL and other institutions have collaborated to develop a machine learning tool that identifies new domains created to promote false information so that they can be stopped before fake news can be spread through social media and online channels. To counter the proliferation of false information it is important to move fast, before the creators of the information begin to post and broadcast false information across multiple channels.

Infosys launched Infosys Live Enterprise Application Management Platform to help organizations run their IT portfolios as engines driving intuitive decisions, building responsive value chains, and delivering perceptive experiences for the business. "We selected Infosys, based on the promise of efficiencies that the Live Enterprise Application Management Platform brings for the digital transformation of Tyson Foods' enterprise value chain."

The DarkSide Ransomware operation claims they are creating a distributed storage system in Iran to store and leak data stolen from victims. In this topic, DarkSide has stated that they are working on a distributed storage system to store and leak victims' stolen data.

Data analysts and data scientists have wanted an easier way to clean and transform this data, and that's what DataBrew delivers, with a service that allows data exploration and experimentation directly from AWS data lakes, data warehouses, and databases without writing code. AWS Glue DataBrew is a visual data preparation tool for AWS Glue that allows data analysts and data scientists to clean and transform data with an interactive, point-and-click visual interface, without writing any code.

Secure Code Warrior has launched Missions-hands-on, interactive coding simulations of real-world applications that encourage developers to experience the real-time impact of poor code practices in a safe environment. Pieter Danhieux, Co-Founder and CEO of Secure Code Warrior, said, "Missions is like a flight simulator for coders. Just like a pilot who needs to continually train to keep flying, Missions offers practical applications of live code in a hyper-relevant environment designed to encourage coders to understand attacks, practice and perfect their secure coding skills and knowledge."

Despite ongoing unsubstantiated claims of fraud from the outgoing Trump administration, senior election officials charged with securing the 2020 vote on Thursday said they had done so successfully. "The November 3rd election was the most secure in American history," said the Elections Infrastructure Government Coordinating Council and the Election Infrastructure Sector Coordinating Council Executive Committees in a joint statement, along with the US government's Cybersecurity and Infrastructure Security Agency and other organizations.