Security News > 2020 > December
Microsoft has confirmed that it, too, is among the companies who have downloaded the compromised SolarWinds Orion updates, but that they have isolated and removed them. "While investigations continue, Microsoft has identified and has been working this week to notify more than 40 customers that the attackers targeted more precisely and compromised through additional and sophisticated measures," Smith said.
Google this week announced an extended support period for Android 11 and later devices launching with Qualcomm System-on-Chip models. Currently, devices receive support for a period of three years, which includes security patches, but moving forth users will enjoy one additional year of operating system and security updates.
After the malicious Orion upgrades were installed on the systems of thousands of SolarWinds customers, Microsoft President Brad Smith said that the suspected Russian hacking group were able to "Pick and choose" targets of interest already compromised organizations. Based on information gathered while investigating the still ongoing hacking campaign, Microsoft has notified the over 40 organizations that were "Targeted more precisely and compromised through additional and sophisticated measures."
Virtualization in the client is different from virtualization in servers. As today's client devices continue to support a diverse set of business-critical applications - and access to highly sensitive data and commercial assets - virtualization can deliver major productivity and security advantages.
While embracing new remote working norms creates a workforce more resilient to business continuity challenges, it also poses new problems. These will push manufacturers to implement stronger security measures for new devices in the coming years, but what about the millions of devices left behind?
Passwords are still used behind the scenes, but they are not entered manually during the login process, helping to minimize password related risks. Employees are happy because they can access their business applications without having to enter additional passwords.
Malware hidden in 28 third-party extensions for Google Chrome and Microsoft Edge redirects users to ads or phishing sites, Avast warned this week. These extensions were designed to redirect users to other websites.
IT leaders shared that their primary challenges for the upcoming year primarily center around adapting infrastructure and networking strategies for remote work or returns to the office. "At every level of the economy and society, IT infrastructure and the professionals tasked with operating it are keeping the world moving in 2020," said Michael Sicoli, President and CEO, INAP. "The results of our survey indicate that the hybrid infrastructure future is becoming a reality a lot sooner for many organizations. As we enter 2021, the technology challenges presented by remote work and accelerated digital transformation initiatives will remain at the forefront for IT infrastructure managers, and as a result, technology professionals have solidified their position as an essential workforce."
The cloud ITSM market size is expected to grow from $4.7 billion in 2020 to $12.2 billion by 2025, at a CAGR of 21.2% during the forecast period, according to MarketsandMarkets. Increased cloud adoption of cloud among SMEs is driving the cloud ITSM market.
Anomali has added new features and capabilities across its product suite that further automate and speed essential tasks performed by threat intelligence and security operations analysts. To provide capabilities that work in real-world investigation scenarios, Anomali Threat Research analysts applied their expertise to aid in the design and development of pre-customized, themed threat intelligence dashboards.