Security News > 2021 > May

Data Wiper Malware Disguised As Ransomware Targets Israeli Entities
2021-05-26 08:30

Researchers on Tuesday disclosed a new espionage campaign that resorts to destructive data-wiping attacks targeting Israeli entities at least since December 2020 that camouflage the malicious activity as ransomware extortions. "An analysis of what at first sight appeared to be a ransomware attack revealed new variants of wipers that were deployed in a set of destructive attacks against Israeli targets," the researchers said.

In-person cybersec training? Yes, it’s back on the agenda this year
2021-05-26 07:30

The last year has taught us that online training can absolutely deliver the same learning experience as traditional in-person training. Cybersecurity training experts SANS has reworked its training approaches and added the option of In-Person Live Stream Training.

Entrust Remote Signing Service provides verified employee identities and strong authentication
2021-05-26 07:30

The Entrust Remote Signing Service provides verified employee identities and strong authentication, which can help facilitate compliance with legal and regulatory requirements. The Entrust Remote Signing Service lets Entrust take care of issuing, storing, and maintaining the signing infrastructure for the customer, with seamless integration to the customer's document workflow application.

Contract killer: Certified PDFs can be secretly tampered with during the signing process, boffins find
2021-05-26 06:46

A pair of techniques to surreptitiously alter the content of certified PDFs have been detailed by researchers in Germany. Using certified PDFs is increasingly common in business.

Measuring impact beyond a single incident
2021-05-26 06:00

Determining the true impact of a cyber attack has always and will likely be one of the most challenging aspects of this technological age. In an environment where very limited transparency on the...

Why is patch management so difficult to master?
2021-05-26 05:30

Each vendor, platform, and application has its own approach to patch management. These processes can alleviate patch management pitfalls, support staff, and up-level an organization's overall security posture.

Four proactive steps to make identity governance a business priority
2021-05-26 05:00

Identity governance shouldn't be celebrated as a singular component of security, but rather a capability that should be woven into the data governance fabric of every organization. With the ability to safeguard information, facilitate compliance, and streamline work processes, it's hard to believe identity governance is not a typical business priority.

Label standard and best practices for Kubernetes security
2021-05-26 04:30

This article talks about label standard and best practices for Kubernetes security, a common area where I see organizations struggle to define the set of labels required to meet their security requirements. My advice is to always start with a hierarchical security design that can achieve your enterprise security and compliance requirements, then define your label standard in alignment with your design.

Enhancing cyber resilience in the oil and gas industry
2021-05-26 04:00

The World Economic Forum has brought together industry and cybersecurity experts from companies and organizations such as Siemens Corp, Saudi Aramco, Royal Dutch Shell, the Cyber Security Agency of Singapore, the U.S. CISA, industrial cybersecurity company Dragos and many others to compile a blueprint for enhancing cyber resilience across the oil and gas industry. Cyber attacks targeting organizations in the oil and gas industry are a daily occurrence, though they seldom lead to high profile outcomes and real-world effects like the recent Colonial Pipeline attack.

Cybersecurity leaders lacking basic cyber hygiene
2021-05-26 03:30

Constella Intelligence released the results of a survey that unlocks the behaviors and tendencies that characterize how vigilant organizations' leaders are when it comes to reducing cyber vulnerability, allowing the industry to better understand how social media is leveraged as an attack vector and how leaders are responding to this challenge. Cybersecurity leaders not paying much attention to cyber hygiene.