Security News > 2021 > March

In the evolution of cyber-attacks I'd argue while the fundamentals have stayed the same there have been two major critical changes recently in the past few years among nation-state and criminal attackers that require us to thoroughly understand and respond in a different manner than in the past. Most of the world and in most industries we've reached the tipping point in our digital dependence on our IT infrastructure and it has drawn attackers in.

61% of manufacturers have experienced cybersecurity incidents in their smart factories and are struggling to deploy the technology needed to effectively manage cyber risk, according to a Vanson Bourne survey of 500 IT and OT professionals in the United States, Germany and Japan. "Manufacturing organizations around the world are doubling down on digital transformation to drive smart factory improvements. The gap in IT and OT cybersecurity awareness creates the imbalance between people, process and technology, and it gives bad guys a chance to attack." said Akihiko Omikawa, executive VP of IoT security for Trend Micro.

Organizations continue to suffer downtime despite IT stacks equipped with all recommended cybersecurity technologies - including continuous data protection, anti-malware with zero-day threat prevention capabilities, automated patch management, vulnerability assessments, and more. As the COVID-19 lockdowns were first beginning a year ago, Acronis launched its inaugural Cyber Protection Week to raise awareness of and engagement with the cyber protection approach that helps organizations more reliably overcome modern IT challenges.

The study also found that the industry has significant opportunities to improve the IAM experience for the majority of hybrid cloud adopters. 88% of respondents find technology issues, such as limited IAM functionality, lack of product scalability, and the inability to manage identity and access across current applications, is preventing their adoption of IAM in the cloud.

Cybersecurity failure is a "Clear and present danger" and critical global threat, yet responses from board directors have been fragmented, risks not fully understood, and collaboration between industries limited, according to a WEF report. The report reveals that boards of directors need to play a more active role in protecting their organization from cyber risks - and provides a solution to this fragmentation.

Indian payment app maker MobiKwik has denied its security has been breached, saying that if it's true, as has been claimed, that its customers' information has appeared on the dark web, then some other platform was totally responsible for that. "Some users have reported that their data is visible on the dark web," reads a message from the company, dated March 30.

Indian payment app maker MobiKwik has denied its security has been breached, saying that if it's true, as has been claimed, that its customers' information has appeared on the dark web, then some other platform was totally responsible for that. "Some users have reported that their data is visible on the dark web," reads a message from the company, dated March 30.

Autohost launched the Autohost Threat Intelligence platform to help hotels and short-term rental property managers and operators guard against a growing number of risks, including deceptive bookings, identity theft and credit card fraud. The Autohost Threat Intelligence platform is open source, cloud-based and able to integrate with property management systems, and other platforms that operators leverage, to provide additional security context for guest vetting.

Sysdig announced the addition of unified cloud and container security with the launch of continuous cloud security posture management. By pairing the Sysdig cloud security capabilities announced today with its container security features, teams can identify the entire attack chain and respond to threats faster.

Cybersecurity researchers on Tuesday disclosed details of a sophisticated campaign that deploys malicious backdoors for the purpose of exfiltrating information from a number of industry sectors located in Japan. Dubbed "A41APT" by Kaspersky researchers, the findings delve into a new slew of attacks undertaken by APT10 using previously undocumented malware to deliver as many as three payloads such as SodaMaster, P8RAT, and FYAnti.