Security News > 2021 > May

The D3 Cloud is regionally deployed and offered through a strategic partnership between DATA3 Corporation and OrionVM. "We're thrilled to partner with OrionVM to bring this solution to market in time to meet the urgent need of applications enabling the remote workforce and the rapidly-changing business environment," said David Harrelson, COO and EVP of DATA3 Corporation. "We believe the D3 Cloud will be a game changer for a lot of businesses and IT service providers looking to gain a competitive edge and their own identity in deploying premium cloud solutions."

Gartner calls this architecture Secure Access Service Edge, and predicts the SASE market will grow from $4.5B in 2021 to $10.9B in 2024, a 42% CAGR. According to Aryaka's 2021 State of the WAN report, which surveyed over 1,300 global enterprises, SASE deployment plans are accelerating, with 29 percent of enterprises stating that they are already deploying what they consider to be a SASE architecture. "The combined technologies will allow us to offer truly converged network and network security as-a-service offerings. It complements our existing portfolio and significantly enhances Aryaka's ability to compete and win larger deals while delivering the industry's most flexible, managed SASE solution experience."

Codefresh announced that Kiersten Gaffney, a seasoned marketing executive for enterprise open source software companies, has been named VP Marketing. "I'm thrilled to be joining Codefresh, a company committed to the open source community while also leading the charge on enterprise adoption of continuous delivery," said Gaffney.

Two waves of global financial phishing attacks that swamped at least 50 organizations in December have delivered three new malware families, according to a report from FireEye's Mandiant cybersecurity team. On Tuesday, the team said that they've dubbed the hitherto-unseen malware strains Doubledrag, Doubledrop, and Doubleback.

Apple on Monday released security updates for iOS, macOS, and watchOS to address three zero-day flaws and expand patches for a fourth vulnerability that the company said might have been exploited in the wild. The development comes a week after Apple rolled out iOS 14.5 and macOS Big Sur 11.3 with a fix for a potentially exploited WebKit Storage vulnerability.

US Department of Defense officials today announced that the department's Vulnerability Disclosure Program has been expanded to include all publicly accessible DOD websites and applications. DOD's VDP is led by the Department of Defense Cyber Crime Center, and it allows security researchers to search for and report any vulnerabilities affecting public-facing DOD information systems.

Dell desktops, laptops, and tablets built since 2009 and running Windows can be exploited to grant rogue users and malware system-administrator-level access to the computers. Essentially, Dell's driver accepts system calls from any user or program on a machine; there are no security checks nor an access control list to see if the caller is sufficiently authorized or privileged.

Both Register.com and Network Solutions are suffering from an ongoing DNS outage that prevents access to websites, VPNs, and other services. This outage started early this morning with customers suddenly finding that their websites or business services were no longer accessible via their hostnames.

Security researchers document 21 major security vulnerabilities in Exim and warn that users are exposed to remote code execution flaws. Security researchers at Qualys have discovered multiple gaping security holes in Exim, a widely deployed mail server that has been targeted in the past by advanced nation state-based threat actors.

SEE: Research: Video conferencing tools and cloud-based solutions dominate digital workspaces; VPN and VDI less popular with SMBs. Ron Bennatan: We all know that the transformation, the move to cloud, the move of the workloads to the cloud, I mean, it's something that's been happening for the last five years and more. One of the hardest things is to deal with that complexity, and the cloud gives you so many options and so much freedom and so much flexibility that it's great to drive business, but it's not always clear whether all the security controls are catching up as quickly as they should be with that transformation and the workloads going in the cloud.