Security News > 2020 > December
TTTech Industrial is launching the first commercial product based on the Linux Foundation's ACRN hypervisor for the industrial market. With the latest release of its Nerve Blue industrial edge computing platform, TTTech Industrial is making ACRN 2.0 available to customers in a commercial, fully supported software solution that runs on a variety of Intel processors in an array of industrial applications.
Virtustream announced Data Slicing and Masking Services for SAP, helping customers automate, copy and secure data in non-production environments. Virtustream's new Data Slicing and Masking Services for SAP solve these challenges through a full, end-to-end software implementation that delivers flexible data extraction, copy reduction, and masking and scrambling capabilities.
In the document, the authors encourage security executives to break the endless cycle of iterative tool adoption, and, instead, move to data-centric security operations that drive integration and automation while simultaneously leveraging cloud-based fusion. "We are in a cyber arms race that has precipitated a security tool-race with adversaries' evolving attacks forcing us to spend more to try to defend ourselves. Our default response is to adopt new tools to try to keep up, but we are losing this race as adversaries continue to outpace defenders," said Jim Reavis, co-founder and CEO, Cloud Security Alliance.
Claroty announced the appointments of Adi Weisz as Vice President of Engineering and Brian Dunphy as Vice President of Product Management. "We're thrilled to have Adi and Brian join us here at Claroty. Their enthusiasm for our mission combined with their deep industry expertise are great assets to our company leadership and product development," said Yaniv Vardi, CEO of Claroty.
The EMA, based in Amsterdam in The Netherlands, is responsible for the evaluation and approval of medicines in the European Union - a role reflected in its former name, the European Agency for the Evaluation of Medicinal Products. There's no suggestion of when the attack was discovered, how it was found, when it probably started, how extensive it seems to have been, how much disruption it has caused, whether anyone outside the EMA was potentially affected, how long it's likely to take to restore the network to normal, or what the EMA is doing right now to stop it happening again.
While we have seen an expected spike in attacks targeting novice remote workers and vulnerable devices to gain network access, we are also beginning to see new attacks targeting connected home networks. Many of the attacks against home networks focused on exploiting older, more vulnerable devices such as home routers and entertainment systems.
Michael Schenck: Cyberconflict is more likely to arise for political, social, and economic reasons, rather than to physically destroy infrastructure. Michael Schenck: I previously mentioned some of the key enterprise vendors with solutions that help protect against cyberconflict.
On Thursday Microsoft warned that there's an ongoing campaign to distribute malware that modifies web browsers to conduct credential theft and ad fraud. Since at least May, 2020, unidentified cybercriminals have been distributing a family of browser modifiers dubbed Adrozek, Microsoft said.
On Thursday Microsoft warned that there's an ongoing campaign to distribute malware that modifies web browsers to conduct credential theft and ad fraud. Since at least May, 2020, unidentified cybercriminals have been distributing a family of browser modifiers dubbed Adrozek, Microsoft said.
Another cyberattack has been launched - this time, threat actors were able to break into the European Medicines Agency server and access documentation about the vaccine candidate from Pfizer and BioNTech. "Today, we were informed by the European Medicines Agency that the agency has been subject to a cyberattack and that some documents relating to the regulatory submission for Pfizer and BioNTech's COVID-19 vaccine candidate, BNT162b2, which has been stored on an EMA server, had been unlawfully accessed," the Pfizer-BioNTech statement said.