Security News > 2020 > December

Offensive Security announces bounty program for user generated content
2020-12-18 03:15

Offensive Security announced a new bounty program for user generated content. Members of the infosecurity community can now receive cash bounties for submitting vulnerable virtual machines to Offensive Security that are eligible to be incorporated into the Proving Grounds training labs.

Sectigo helps OEMs and enterprises secure their connected devices and products
2020-12-18 03:00

Sectigo has released multiple advancements to the company's award-winning IoT Security & Identity Management Platform, making integration and management of secured connected devices even easier for OEMs and enterprises. The Sectigo IoT Security Platform delivers end-to-end security services for every class of connected device, from manufacture through its lifecycle, enabling OEMs to build secure devices that are compliant with security standards and new IoT security regulations.

IBM Security allows companies to experiment with fully homomorphic encryption
2020-12-18 02:45

IBM Security launched a new service that allows companies to experiment with fully homomorphic encryption - an emerging technology designed to allow data to remain encrypted even while being processed or analyzed in cloud or third-party environments. The new IBM Security Homomorphic Encryption Services provide companies with education, expert support, and a testing environment for clients to develop prototype applications that can take advantage of FHE. With the growth of hybrid cloud, sensitive data will be even more broadly stored, shared and analyzed across platforms and parties, exposing it to varying security controls and risks.

Proact Hybrid updates offer customers flexibility in moving data between different platforms
2020-12-18 02:30

Proact launches new updates to its flexible managed cloud service, Proact Hybrid, ideally suited for organizations that seek the benefits of an integrated cloud platform but still need to adhere to strict requirements on data sovereignty and data location. These opportunities also come with new types of challenges and threats involving data security, data sovereignty, data location and data accessibility.

HITRUST MyCSF streamlines regulatory compliance reporting
2020-12-18 02:15

HITRUST announced a major feature enhancement to its information risk management platform, HITRUST MyCSF, that significantly streamlines how organizations capture and present regulatory compliance evidence. Both the new Compliance and Reporting Pack feature for HITRUST MyCSF and the new Regulatory Assistance Center initially focus on the Health Insurance Portability and Accountability Act, expanding into other regulations in the future.

Inseego launches four 5G fixed wireless solutions for home cord-cutters and business premises
2020-12-18 02:00

Inseego introduced four new 5G fixed wireless solutions designed to meet the needs of users in almost any location, from underserved rural areas to dense urban environments, from residential settings to business premises. Named the Wavemaker series, this is one of the industry's broadest line-ups of 5G fixed wireless products.

US nuke agency hacked by suspected Russian SolarWinds spies, Microsoft also installed backdoor
2020-12-18 01:59

America's nuclear weapons agency was hacked by the suspected Russian spies who backdoored SolarWinds' IT monitoring software and compromised several US government bodies, and Microsoft was caught up in the same cyber-storm, too, it was reported Thursday. The Windows giant uses SolarWinds' network management suite Orion, downloads of which were secretly trojanized earlier this year so that when installed within certain targets - such as the US government departments of State, Treasury, Homeland Security, and Commerce - the malicious code's masterminds could slip into their victims' networks, execute commands, read emails, steal data, and so on.

Innodisk InnoAGE provides full recovery to IoT edge devices
2020-12-18 01:45

The new-patented recovery technology of on-site recovery and 24/7 no-man monitoring feature come together by InnoOSR and following feature enhancement. Now Innodisk's exclusive InnoAGE series are able to meet full recovery scenarios.

nOps brings API integration with AWS Well-Architected Tool to support AWS Well-Architected Reviews
2020-12-18 01:30

The new nOps API integration provides a seamless experience for AWS Partners to execute these AWS Well-Architected Framework Reviews. With the new integration, nOps partners can easily share information created by nOps during an AWS Well-Architected Framework Review with the AWS Well-Architected Tool for AWS program reporting requirements.

“Is it you in the video?” – don’t fall for this Messenger scam
2020-12-18 01:21

This scam goes even further - whether as a distraction to buy a bit of time before victims realise they've been taken in and rush to change their Messenger passwords, or simply to give the crooks a second bite at the cherry, we don't know. After entering your password, there's a short delay, as you might expect whan logging in to any online service, after which the crooks seem to pick from a range of other scams and redirect you to one of them randomly.