Security News > 2020

Marriott Suffers Second Breach Exposing Data of 5.2 Million Hotel Guests
2020-03-31 08:52

International hotel chain Marriott today disclosed a data breach impacting nearly 5.2 million hotel guests, making it the second security incident to hit the company in recent years. The hospitality giant said an investigation into the breach was ongoing, but said there was no evidence that Marriott Bonvoy account passwords or PINs, payment card information, passport information, national IDs, or driver's license numbers were compromised.

“Instant bank fraud” warning spread on WhatsApp is a hoax
2020-03-31 08:25

Last week we wrote about a WhatsApp hoax that was spreading widely, warning people to look out for a cybersecurity catastrophe that simply wasn't going to happen. The City of London Police in turn link you to UK National Fraud and Cyber Crime Reporting Centre's ActionFraud website, where you will see that the "City of London Police hasn't issued any alerts about fake messages from Danske Bank.".

Webinar – Getting Inside the Mind of an Attacker: TLS Attacks and Pitfalls
2020-03-31 07:55

Transport Layer Security is a common cybersecurity protocol that is frequently seen in email, web browsers, messaging, and other communication methods that take place over networks. TLS is relied upon to ensure secrecy using different techniques like encryption, hash functions, and digital signatures.

Distributed disruption: Coronavirus multiplies the risk of severe cyberattacks
2020-03-31 05:30

A few days earlier, the U.S. Department of Health and Human Services suffered a DDoS attack, assumed to have been launched by a hostile foreign actor, aimed at slowing down the agency's services amid the government's rollout of a response to coronavirus. During an unprecedented time of peak traffic, the risk of a DDoS attack is growing exponentially.

21% of SMBs do not have a data backup or disaster recovery solution in place
2020-03-31 05:00

"Data protection can come into play in a wide array of important ways - including data security and encryption, data recovery, email protection and data archiving. It also provides the ability to recover quickly from a disaster, protection from and mitigation of ransomware, and physical device protection. Plus, it can prevent user error," said Reeder. Top executives in education see data backup and data recovery as the most important aspects of data protection.

Steering your network in the right direction with segmentation
2020-03-31 04:30

The problems imposed by repurposing unique innovations can also be seen in the world of network technology. As network speeds increased from 10Mb to 100Mb, it was discovered that this model could not scale.

The potential impact of SAP security remediation
2020-03-31 04:00

More than two thirds of SAP users believe their organizations put insufficient focus on IT security during previous SAP implementations, while 53.4% indicated that it is 'very common' for SAP security flaws to be uncovered during the audit process. 74.0% expect IT security to take greater priority in future SAP deployments, with 89.6% agreeing that security specialists should be brought on board to support their SAP S/4 HANA transformation programs.

Researchers find shift in monthly web traffic amidst pandemic
2020-03-31 03:30

The report revealed increased spikes in attacks against government and law sectors as the United States launched its Democratic primaries, and early signs of change in industry traffic and attack trends due to COVID-19. During the month of February, Imperva began monitoring how and if the cross-border spread of COVID-19 started to affect traffic and attack trends across multiple industries and countries.

CI Security Work From Home Security Policy Assessment helps orgs manage risks
2020-03-31 01:30

CI Security, a Managed Detection and Response services provider specializing in defending the networks of organizations and critical infrastructure, announced the addition of a Work From Home Security Policy Assessment to the company's managed services offering. The Work From Home Security Policy Assessment provides a comprehensive view of the risks faced by an organization and its remote workforce, the capabilities of the organization to implement appropriate and effective security controls, including how to monitor an expanded, and in many cases unmanaged, set of endpoints.

New RiskSense SRS outside-in capabilities extend inside-out risk scoring and prioritization
2020-03-31 00:30

The cloud-delivered RiskSense solution now combines RBVM with RiskSense SRS to provide 360 degree visibility that eliminates security gaps and enables security teams to measure, prioritize, and control both inside-out and outside-in risks from one integrated console. The new RiskSense SRS capabilities, which are fully integrated with the RiskSense platform, require nothing more than a second-level domain name to start performing a continuous, independent, quantitative discovery and analysis of all internet-accessible assets.