Security News > 2021 > June

The Swedish Public Health Agency is currently investigating several attempts to hack into SmiNet, a database that stores reports of infectious diseases, including COVID-19 cases. SmiNet was shut down on Thursday, after the agency identified several attempts to gain unauthorized access to the database, but it was restored by Friday night.

Security teams deploy several technologies to protect their attack vectors. Verizon's 2021 data breach report shows phishing is responsible for the vast majority of breaches and Business Email Compromises were the second most common form of social engineering.

Both companies provide - among several others - cybersecurity services, and Ascend said the deal will enable it to offer a brader portfolio of services and solutions, including network monitoring and cybersecurity assessments. State-owned communications and cybersecurity firm Kordia has acquired Base2, which provides managed IT, network, and cybersecurity solutions.

The website for the M1racles security vulnerability is an excellent demonstration that not all vulnerabilities are exploitable. Be sure to read the FAQ through to the end. EDITED TO ADD: Wired article.

JBS USA, the US subsidiary of the world's largest meat processing company, said Monday that some operations were shut down following a cyberattack that affected its North American and Australian IT network. Headquartered in Greeley, Colorado, JBS USA is a global food company wholly owned by Brazil-based JBS S.A., the largest meat processing firm in the world.

That's why last December we were one of the first in the world to launch support for the Intel SGX encryption standard in our public cloud. This technology dramatically enhances data protection with built-in cloud management tools from Intel.

Data analytics is and in-depth way of knowing your data and making the most of it, while protecting your assets. To select a suitable data analytics solution for your business, you need to think about a variety of factors.

Gartner's recent Hype Cycle for Application Security report, and Forrester's The State of Application Security 2021 report - both bibles for security experts that undoubtedly help to shape their program and potential product adoption - are almost entirely tools-focused. Security tooling is a must-have, but we need to look wider and restore balance to the people component of security defense.

While traditional IT teams and inventory tools provide an IT view of inventory, software support, and licensing, security teams are looking for the security context of assets such as assets that are not running security tools, detection of unauthorized software, internet visibility, and more. Security tools like EDR help secure assets, but do not let security teams know which critical assets are not running EDR, or if databases are visible from the internet? All security teams have defined authorized and unauthorized software policies.

In July 2019, the EUCC was the first candidate cybersecurity certification scheme request received by the EU Agency for Cybersecurity under the Cybersecurity Act. This scheme aims to serve as a successor to the currently existing schemes operating under the SOGIS MRA. It covers the certification of ICT products, using the Common Criteria ISO/IEC 15408 and is the foundation of a European Cybersecurity certification framework.