Security News > 2020 > November

Malwarebytes announced that it will be offering their remediation solution to CrowdStrike customers to elevate and simplify enterprise remediation efforts. When used together, Malwarebytes Remediation for CrowdStrike and the CrowdStrike Falcon platform provide a comprehensive solution for preventing a compromised device from becoming a full-scale breach.

Onix announced it has signed an expanded agreement with Google Cloud to accelerate its growth and grow customer adoption of Google Cloud products and solutions. Under this agreement, Onix will leverage its world-class services team to drive the adoption of Google Cloud with its current and future customers.

Aviatrix announced that Cyrous Jamé will join the company as CFO. Jamé was formerly the head of finance for Google Play, and also held finance leadership positions in ads, media and consumer hardware at Google over the last ten years. "Cyrous brings a strong track record of driving results and accelerating growth at Google, and we are thrilled to have him join Aviatrix as CFO," said Steve Mullaney, CEO of Aviatrix.

Throughout her career, Fernandez has prioritized customer-centricity and built an impressive record of producing compelling contemporary digital initiatives, thought-leadership campaigns and global marketing activities. Fernandez joins Fusion from Regulatory DataCorp, Inc., a global leader in compliance screening, where she served as Global Head of Marketing and led the company's go-to-market activities.

The vulnerability exists in the Oracle Solaris Pluggable Authentication Module and allows an unauthenticated attacker with network access via multiple protocols to exploit and compromise the operating system. "In mid-2020, we observed UNC1945 deploy EVILSUN-a remote-exploitation tool containing a zero-day exploit for CVE-2020-14871 - on a Solaris 9 server," said researchers with FireEye, in a Monday analysis.

Mac users can do more than just compress files using WinZip Mac 8 Pro. Figure A. The WinZip Mac 8 Pro wizard simplifies backing up specific files.

The third data protection pillar - securing data-in-use - has been elusive, but is in the process of being addressed through the transformational motion commonly referred to as confidential computing. As the third pillar of data security, confidential computing will increasingly be a prerequisite for any cloud-deployed business application.

The APT threat landscape is a mixed bag of tried-and-true tactics and cutting-edge techniques, largely supercharged by geo-politics, a report finds. Advanced persistent threat groups continue to use the fog of intense geopolitics to supercharge their campaigns, but beyond these themes, actors are developing individual signature tactics for success.

A diverse set of companies, including an adaptive-learning platform in Brazil, an online grocery service in Singapore and a cold-brew coffee-maker company, are caught up in the large data trove. A whopping 34 million user records have materialized on an underground sales forum, which cybercriminals claim are gleaned from 17 different corporate data breaches.

The notion of the traditional email attack campaign is dying. Phishing is one of the most common email attack techniques.