Security News > 2021 > March

The recently patched vulnerabilities in Microsoft Exchange have sparked new interest among cybercriminals, who increased the volume of attacks focusing on this particular vector. While ransomware attacks have increased in frequency in the past six months, cybersecurity company Check Point last week noticed a surge in incidents targeting Microsoft Exchange servers vulnerable to the so-called ProxyLogon critical bugs.

So-called cyber-attack insurance "Cannot be a substitute for better basic cybersecurity," the National Cyber Security Centre's chief exec has said in her first major speech since taking office. Lindy Cameron took over from founding CEO Ciaran Martin last summer and on Friday made her first public appearance since taking office.

We're only three months into 2021, and Akamai has mitigated 3 out of the 6 largest DDoS attacks they have ever witnessed. Hoping for a major Bitcoin payout, DDoS attackers continue to raise the bar when it comes to attack size, frequency, and target diversification.

While it will not come as shock to anyone, a new report finds that people still hate passwords. That's the conclusion of the Impact of Passwords on Your Business report from Transmit Security, an identity management company.

A report released Tuesday by cyber threat intelligence provider Check Point Research looks at the latest trend among ransomware attacks and suggests some tips on how to combat them. More ransomware attacks are exploiting vulnerabilities in Microsoft Exchange, most notably in light of the recent Exchange hack that has impacted many organizations.

The UK's Home Office is on the hunt for a supplier to help support applications running on its counter-terrorism data network to fulfil a contract that could be worth up to £32m. The National Communications Data Service gives security, intelligence, and law enforcement agencies legal access to communications data. In a tender document released last week, the Home Office said it was looking to engage suppliers early before it puts together a contract to "Facilitate the delivery of its communications data applications."

A web application firewall is your first line of defence when it comes to protecting your organization from an array of potential threats. By filtering out the content scrapers, bots, and other web creepy-crawlies, you can remove their impact on your infrastructure reduce the overall cost of maintaining your web presence.

Applications: Convert all shadow IT, shadow cloud, and bring-your-own applications to managed and secured applications. This is common because it seems easier to prove zero trust by starting with one application.

Cloud computing security is far and away the most in-demand skillset,² found, with 40% of respondents saying that they plan to develop it over the next two years. It's easy to understand why: with enterprise IT infrastructure, applications and data increasingly being moved to the cloud, IT security must move to the cloud as well.

Source Defense provides in-depth analysis of the client-side threat landscape and specific attacks like formjacking, Magecart and web browser threats. The research offers a rare window on web security sentiments for a population relying almost exclusively on websites for all manner of shopping, healthcare, financial services and other essential needs during the pandemic.