Security News > 2020

Spear-Phishing Attack Lures Victims With ‘HIV Results’
2020-03-10 10:00

Recently discovered spear-phishing emails are using a unique "Scare-factor" lure to convince victims to open attached malicious Microsoft Excel documents: Their HIV test results. "But they should never lead us to fall victim to phishing campaign. Threat actors regularly use purported health information in their phishing lures because it evokes an emotional response that is particularly effective in tricking potential victims to open malicious attachments or click malicious links."

Spear-Phishing Attack Lures Victims With ‘HIV Results’
2020-03-10 10:00

Recently discovered spear-phishing emails are using a unique "Scare-factor" lure to convince victims to open attached malicious Microsoft Excel documents: Their HIV test results. "But they should never lead us to fall victim to phishing campaign. Threat actors regularly use purported health information in their phishing lures because it evokes an emotional response that is particularly effective in tricking potential victims to open malicious attachments or click malicious links."

Why a risk-based approach to application security can bolster your defenses
2020-03-10 06:00

Often business priorities are given precedence over security priorities, particularly when optimal security practices risk interfering with business efficiency or overall productivity. Underfunding security in order to boost other areas of the business may seem like a good idea in the short term, but it's a big risk that can come back to bite senior executives pretty spectacularly if they aren't careful.

What is open threat intelligence and what is driving it?
2020-03-10 05:30

First question for the podcast, Todd, what is open threat intelligence and what is driving it? That's really what is driving this movement, a desire to have a broader and more open view of threat intelligence.

PPP Daemon flaw opens Linux distros, networking devices to takeover attacks
2020-03-10 05:00

A vulnerability in the Point-to-Point Protocol Daemon software, which comes installed on many Linux-based and Unix-like operating systems and networking devices, can be exploited by unauthenticated attackers to achieve code execution on - and takeover of - a targeted system. Pppd is a daemon that is used to manage PPP session establishment and session termination between two nodes on Unix-like operating systems.

Google Allows Enrolling Security Keys on More Devices
2020-03-10 04:48

Google has announced that Android and macOS users can now use more web browsers to initially register security keys to their accounts. Now, Google aims to help more users take advantage of the capability through making it easier to enroll security keys.

Researchers develop data exchange approach with blockchain-based security features
2020-03-10 04:30

An IT startup has developed a novel blockchain-based approach for secure linking of databases, called ChainifyDB. "Our software resembles keyhole surgery. With a barely noticeable procedure we enhance existing database infrastructures with blockchain-based security features. Our software is seamlessly compatible with the most common database management systems, which drastically reduces the barrier to entry for secure digital transactions," explains Jens Dittrich, Professor of Computer Science at Saarland University at Saarbrücken, Germany. "If a doctor changes something in his table, it affects all other tables in the network. Subsequent changes to older table states are only possible if all doctors in the network agree," explains Jens Dittrich.

eBook: Automating Incident Response
2020-03-10 04:00

This 17-page e-book examines the increasing pressures faced by cybersecurity teams, risks of ineffective alert triage and new automation capabilities that dramatically improve the efficiency of...

Zimperium’s new solution helps orgs protect their mobile apps throughout their entire life cycle
2020-03-10 03:30

ZimperiumZimperium, the global leader in mobile threat defense, announced a first-of-its-kind complete Mobile Application Protection Suite, a comprehensive solution that helps organizations protect their mobile apps throughout their entire life cycle. "Until now, organizations trying to secure their mobile apps have been forced to piecemeal security solutions together," said Nitin Bhatia, chief strategy officer at Zimperium.

Telia Carrier’s new global service expands its SD-WAN solution portfolio
2020-03-10 03:00

Telia Carrier launched its advanced SD-WAN service, an end-to-end networking solution that provides superior visibility, agility and control beyond the traditional WAN perimeter. Based on Cisco SD-WAN powered by Viptela, it is the only SD-WAN service in the world where enterprises can attach their WAN overlay to the world's best-connected internet backbone network, entirely operated by Telia Carrier.