Security News > 2021 > May

Stopping cybersecurity threats is a community effort, expert says
2021-05-19 15:37

Why intelligence sharing is important to help get ahead of attacks. If knowledge is shared with others, they can thwart attacks sooner.

Recycle Your Phone, Sure, But Maybe Not Your Number
2021-05-19 15:13

The Princeton team has a number of recommendations for T-Mobile and Verizon, noting that both carriers allow unlimited inquiries on their prepaid customer platforms online - meaning there is nothing to stop attackers from automating this type of number reconnaissance. The carriers could offer their own "Number parking" service for customers who know they will not require phone service for an extended period of time, or for those who just aren't sure what they want to do with a number.

1Password: How to install the password manager on Linux
2021-05-19 15:11

Jack Wallen installed 1Password on Linux and found it to be a fantastic solution for password management. Follow his tutorial on how to get this proprietary solution installed on your open source OS. This is a tricky proposition for some-an official 1Password client has been released for Linux.

US introduces bills to secure critical infrastructure from cyber attacks
2021-05-19 14:56

The U.S. House Committee on Homeland Security has passed five bipartisan bills on Monday to bolster defense capabilities against cyber attacks targeting U.S. organizations and critical infrastructure. The five bipartisan bills are also designed to make it easier to defend networks from cyber attacks using critical security vulnerabilities such as those abused in campaigns targeting vulnerable Microsoft Exchange Server and Pulse Connect Secure devices earlier this year.

Probe Into Florida Water Plant Hack Led to Discovery of Watering Hole Attack
2021-05-19 14:36

An investigation conducted by industrial cybersecurity firm Dragos into the recent cyberattack on the water treatment plant in Oldsmar, Florida, led to the discovery of a watering hole attack that...

Probe Into Florida Water Plant Hack Led to Discovery of Watering Hole Attack
2021-05-19 14:36

An investigation conducted by industrial cybersecurity firm Dragos into the recent cyberattack on the water treatment plant in Oldsmar, Florida, led to the discovery of a watering hole attack that initially appeared to be aimed at water utilities. While investigating the incident, Dragos' threat hunters noticed that the website of a Florida water infrastructure construction company had been compromised and set up to serve as a watering hole.

Windows PoC Exploit Released for Wormable RCE
2021-05-19 14:35

A researcher has released a proof-of-concept exploit for CVE-2021-31166, a use-after-free, highly critical vulnerability in the HTTP protocol stack that could lead to wormable remote code execution. An exploit would allow RCE with kernel privileges or a denial-of-service attack.

Rubrik announces security upgrades aimed at alleviating the impact of ransomware attacks
2021-05-19 14:32

Data management company Rubrik has announced a number of data security enhancements to its platform aimed at helping organizations assess the impact of ransomware attacks and automate recovery for business continuity. Backup software is a core technology in every IT organization, but what has changed is that protecting against ransomware attacks has become "An integral component of a company's cyber resilience strategy," said Greg Smith, vice president of product marketing at Rubrik, in an interview.

How to protect your organization and users against malicious emails
2021-05-19 14:26

Cybercriminals are increasingly using email as an easy and effective way to infect computers with malware and trick potential victims with phishing scams, says Trustwave. In a report released Wednesday, cybersecurity provider Trustwave looks at email scams prevalent in 2020 and provides advice on how to combat them.

Cloud collaboration software are the new tools of choice for cybercriminals
2021-05-19 14:13

The latest escalation of the cybersecurity arms race finds threat actors following their targets into the cloud as they start to launch difficult-to-detect attacks by leveraging trusted domains owned by companies like Google and Microsoft. According to a blog post from cybersecurity software company Proofpoint, cloud collaboration tools like Microsoft 365, Azure, OneDrive, SharePoint, G-Suite and Firebase are being used to launch an increasing number of cyberattacks, and their cloud-hosted nature makes them difficult to detect.