Security News > 2021 > May

SonicWall last week announced the availability of patches for a severe vulnerability in its Network Security Manager product. NSM is a firewall management application that provides the ability to monitor and manage all network security services from a single interface, as well as to automate tasks to improve security operations.

A new piece of ransomware named Epsilon Red has been used to target at least one organization in the United States, and its operators have apparently already made a significant profit. Cybersecurity firm Sophos reported last week that Epsilon Red operators have been spotted targeting a US-based company in the hospitality sector.

An alert released on Friday by the FBI and the DHS's Cybersecurity and Infrastructure Security Agency revealed that the number of organizations targeted in a recent attack abusing a legitimate email marketing service was higher than initially reported. Microsoft reported last week that the Russia-linked threat actor it tracks as Nobelium, which is believed to be responsible for the SolarWinds supply chain attack, had been abusing a legitimate mass email service named Constant Contact to target government and other types of organizations in the United States and a dozen other countries.

A group of online privacy activists said Monday it is taking action against hundreds of websites over their use of pop-up banners asking users to consent to "Cookies", the files that track users' activity. The Vienna-based NOYB group said it would be presenting more than 500 draft complaints to companies over what it calls the "Cookie banner terror" which has turned the internet into "a frustrating experience for users all over Europe".

While the underlying tenets of not relying on a single vendor and taking advantage of best-of-breed expertise for each system or tool is still valid, it has become obvious that data needs to be combined to understand the complete attack surface and progression of the kill chain. SIEM was created over fifteen years ago to integrate security data for providing real-time analysis of security alerts generated by applications and network hardware.

With so many companies being targeted by domain impersonators, email domain spoofing shouldn't be taken lightly. Forging the email domain or address: wherein attackers exploit loopholes in existing email security protocols to send emails on behalf of a legitimate domain.

From authenticating to an API for advanced features to credential management, it is critical to have a deep understanding and awareness of data protection best practices. On the customer end, in-house security and engineering staff can prep for CPaaS implementation by becoming familiar with the use of APIs and the authentication methods, communications protocols and the data that flows to and from them.

Masergy released the results of a research study assessing where businesses are in their journey to SD-WAN and Secure Access Service Edge. SD-WAN connectivity gaining traction SD-WAN is gaining traction in the digital business environment: SD-WAN adoption is expected to rise to 92% of companies and 64% of sites by 2026 with most adopting it for efficiency, cost savings, and agility.

Siemens on Friday shipped firmware updates to address a severe vulnerability in SIMATIC S7-1200 and S7-1500 programmable logic controllers that could be exploited by a malicious actor to remotely gain access to protected areas of the memory and achieve unrestricted and undetected code execution, in what the researchers describe as an attacker's "Holy grail." In an advisory issued by Siemens, the German industrial automation firm said an unauthenticated, remote attacker with network access to TCP port 102 could potentially write arbitrary data and code to protected memory areas or read sensitive data to launch further attacks.

"As businesses continue to empower remote workers and fortify their digital footprints in response to pandemic-induced changes, colocation has emerged as an essential pillar in a successful hybrid IT strategy," said John Gallant, Enterprise Consulting Director at IDG Communications. Colocation lowers operational costs and improves TCO Increased security and flexibility/scalability were reported as top two primary reasons to migrate workloads to colocation solution.