Security News > 2021 > May
N-able announced two new additions to its executive leadership team. The new appointments extend the N-able commitment to delivering the protection, performance, and partnerships MSPs need to power their customers-and their business-forward.
More than 100 million Android users are at risk after 23 different mobile apps were found to leak personal data in the wake of rampant cloud misconfigurations. In the case of at least two of the apps, cloud keys were exposed with no safeguards, according to the researchers.
One of America's largest broadband providers, has now deployed RPKI on its network to defend against BGP route hijacks and leaks. "In practical terms, it means that Comcast now both cryptographically signs route information and validates the cryptographic signatures of other networks' route information."
We look into an unnerving case of mixed-up video feeds. We warn you against "Going rogue" when you can't get the download you want from the regular place.
Microsoft has released SimuLand, an open-source lab environment to help test and improve Microsoft 365 Defender, Azure Defender, and Azure Sentinel defenses against real attack scenarios. SimuLand test labs "Provide use cases from a variety of data sources including telemetry from Microsoft 365 Defender security products, Azure Defender, and other integrated data sources through Azure Sentinel data connectors," MSTIC Threat Researcher Roberto Rodriguez said.
Given the rapid expansion of the potential attack surface, the interconnection of devices and data across a larger digital environment, and the inconsistent and fragmented approach to security taken by many organizations, cybersecurity risk has never been greater. In most cases, exploits targeting newly released vulnerabilities show up within a few hours of a vulnerability being made public.
That mobile app you've been using could be exposing your personal data to the wrong people, not because of the way the app is designed but because of the way it taps into third-party services. The challenge is that today's mobile apps increasingly rely on third-party data and services.
Competitive market analysis is a form of research that's often done by gig workers, Christiansen pointed out. Aside from the potential for breaking the chain of data custody with unauthorized data sharing, other data-security risks associated with gig workers include the ability for them to fall prey to cyberattacks, since they're often working outside of the company security footprint, he added.
Slack is experiencing a worldwide outage preventing users from posting messages, uploading images, or connecting to their servers. May 20, 5:27 PM UTC. Some users may be experiencing issues loading Slack.
To give themselves an edge, many organizations set up threat intelligence programs. "I've seen a lot of threat intelligence programs that are just about pretty reports or some metric [such as] how many attacks we have seen on our website," said Shi.