Security News > 2021 > August

China-linked hacking group APT31 has been using new malware in recent attacks targeting Mongolia, Belarus, Canada, the United States, and - for the first time - Russia, according to enterprise cybersecurity firm Positive Technologies. In July 2021, the group was officially accused of targeting vulnerabilities in Microsoft Exchange servers, on behalf of China, and France warned of APT31's continuous abuse of hacked routers in malicious attacks.

A Chrome 92 update released this week by Google patches 10 vulnerabilities, including several high-severity flaws that earned researchers tens of thousands of dollars in bug bounties. Google described the issue as a heap buffer overflow in Bookmarks.

Researchers have identified more than a dozen vulnerabilities in the NicheStack TCP/IP stack, which appears to be used by many operational technology vendors. The vulnerabilities are collectively tracked as ??INFRA:HALT. The security holes, discovered by researchers from ??Forescout Research Labs and JFrog Security Research, can be exploited by an attacker for remote code execution, denial-of-service attacks, information leaks, TCP spoofing, and DNS cache poisoning.

Study for the CISSP exam anytime, anywhere using this FREE interactive self-study tool that tests knowledge across all eight CISSP domains and gives you immediate feedback to reinforce learning. The CISSP stands out as the industry's most respected cybersecurity certification.

UK data watchdog sees its approach to government health tech during COVID-19 outbreak as 'pragmatic'
The UK's data watchdog has defended its approach to regulating government health technologies during the pandemic as "Pragmatic." In its annual report, the Information Commissioner's Office said it had supported public health innovation, reflecting the flexibility of data protection law.

In this review, we will analyze Group-IB Digital Risk Protection, an Al-driven product that helps detect the exposure of your digital assets and protect them from misuse. Group-IB Digital Risk Protection is a tool that helps companies protect their intellectual property at all levels - internally, on the indexed web, but also in the dark web.

Many organisations find themselves using more than one of these security generations at the same time, which might include several versions of EDR alone. That's because many earlier EDR systems solve one set of problems by creating a new more demanding set, namely alert overload and complexity.

AWS S3 buckets are now exposed via additional channels and APIs, which create new security blind spots that hackers are waiting to exploit. The insurtech vendor promises to its customers to provide responses within minutes, and the business process demands opening these potentially dangerous files and processing them in this time range.

For cloud environments, striking the balance between innovation and security is a challenge that must be overcome to ensure organizations can successfully embrace digital transformation. With 92% of enterprises implementing a multi-cloud strategy, the cloud environment is becoming increasingly complex, and security is therefore harder to manage.

The National Security Agency and the Cybersecurity and Infrastructure Security Agency have published comprehensive recommendations for strengthening the security of an organization's Kubernetes system. To help companies make their Kubernetes environment more difficult to compromise, the NSA and CISA released a 52-page cybersecurity technical report that offers guidance for admins to manage Kubernetes securely.