Security News > 2021 > May
Imperva introduces a new data privacy solution to help organizations discover, identify and protect personal data in any on-prem, cloud, hybrid and multi-cloud environment. Today, more than 107 countries have enacted data privacy or protection laws including the right to be forgotten, the right to know what data they have, the right to rectify errors, and the right to port personal data.
Cybersecurity researchers on Wednesday publicized the disruption of a "Clever" malvertising network targeting AnyDesk that delivered a weaponized installer of the remote desktop software via rogue Google ads that appeared in the search engine results pages. AnyDesk's remote desktop access solution has been downloaded by more than 300 million users worldwide, according to the company's website.
Offices of multiple Japanese agencies were breached via Fujitsu's "ProjectWEB" information sharing tool. Fujitsu also said that attackers had gained unauthorized access to projects that used ProjectWEB, and stolen proprietary data.
The modern CISO. The role of CISO first emerged as organizations embraced digital revolutions and began relying on new data streams to help inform business decisions. As the years have gone by and cyberattacks have become more sophisticated, the role of the CISO has had to advance.
Because SASE really is a significant step forward, especially for today's dispersed, fragmented and highly complex networks. Because SASE allows key security functions to be moved from the network edge to the cloud, organisations can build a flexible cybersecurity operation that is inherently flexible.
In the aftermath of the Colonial Pipeline attack, ISACA polled more than 1,200 members in the United States and found that 84 percent of respondents believe ransomware attacks will become more prevalent in the second half of 2021. The Colonial Pipeline incident caused massive disruptions to gasoline distribution in parts of the US this month, resurfacing preparedness for ransomware attacks as a front-burner topic for enterprises around the world.
A Checkbox Survey vulnerability that could allow a remote attacker to execute arbitrary code without authentication is being exploited in the wild, the CERT Coordination Center at Carnegie Mellon University warns. A flexible online survey tool written in ASP.NET, Checkbox Survey helps organizations create professional surveys that can be easily accessed from either desktop computers or mobile devices.
Popular preconceptions of enterprise security and network usage are often inaccurate, according to Cato Networks. Legacy security defenses fail as old exploits form most common threat.
The Uyghur community located in China and Pakistan has been the subject of an ongoing espionage campaign aiming to trick the targets into downloading a Windows backdoor to amass sensitive information from their systems. The Uyghurs are a Turkic ethnic minority group originating from Central and East Asia and are recognized as native to the Xinjiang Uyghur Autonomous Region in Northwest China.
Investments in quantum computing are expected to increase in the next 24 months, according to the survey results from IDC. The number of organizations allocating more than 17% of their annual IT budgets for this technology is expected to rise from 7% in 2021 to an estimated 19% in 2023. This growth is due to global enterprises investing in cloud-based platforms that provide access to quantum computing hardware and software, hiring quantum specialists, training quantum developers, and collaborating with quantum vendors to develop new business solutions.