Security News > 2021
"Steve brings deep business and go-to-market expertise to Okta and adding him in this net-new role will only bolster our focus on operational rigor and data-driven decision making within worldwide field operations." "As customers continue to look to Okta to provide a platform to address every identity use case, Steve will play an integral role supporting our go-to-market strategy, driving predictable revenue, and ensuring we deliver delightful customer experiences."
The shift to remote working over the last year hasn't been all bad - it's forced the pace of digital transformation and encouraged many organisations to rethink the way they operate. Even as workforces retreated to their homes, malefactors seized on the vulnerability of endpoints outside the corporate network, as Malwarebytes' 2021 State of Malware Report showed.
Attendees will explore the mind of a hacker, role play and share real-world experiences at the free two-day event hosted by Huntress. On the heels of the exploitation of Microsoft Exchange servers and the SolarWinds hack, managed detection and response provider Huntress is hosting its second annual free hack it event on March 23-24.
A popular line of small business routers made by Cisco Systems are vulnerable to a high-severity vulnerability. Cisco issued fixes on Wednesday for the flaw in its RV132W ADSL2+ Wireless-N VPN routers and RV134W VDSL2 Wireless-AC VPN routers.
Thanks to a new plea deal with the Florida State Attorney's Office, the 18-year-old behind last summer's breach of Twitter's high-profile accounts will not be charged as an adult, and instead will serve his sentence in juvenile detention. Graham Ivan Clark was arrested seven months ago, and has accepted responsibility the July "Bit-Con" Twitter breach.
Audacity 3.0 has been released with a new AUP3 file format that makes it harder for projects to become damaged and to increase performance while editing audio. In the past, when saving an Audacity project, the program would create a.aup file and an associated subfolder containing multiple other files related to the project.
Researchers at cybersecurity company GRIMM recently published an interesting trio of bugs they found in the Linux kernel. Except, of course, that most Linux systems not only come with hundreds or even thousands of kernel modules in the /lib/modules directory tree, ready to use in case they are ever needed, but also come configured to allow suitably authorised apps to trigger the automatic loading of modules on demand.
The U.S. Department of Justice on Friday announced an indictment against Jean-Francois Eap, the CEO of encrypted messaging company Sky Global, and an associate for wilfully participating in a criminal enterprise to help international drug traffickers avoid law enforcement. Sky ECC is said to have surged in popularity following a similar takedown of Encrochat last July by French and Dutch investigators, with many criminal gangs shifting to the service to carry out criminal acts.
Cybersecurity researchers on Monday disclosed a new wave of ongoing attacks exploiting multiple vulnerabilities to deploy new Mirai variants on internet connected devices. Regardless of the flaws used to achieve successful exploitation, the attack chain involves the use of wget utility to download a shell script from the malware infrastructure that's then used to fetch Mirai binaries, a notorious malware that turns networked IoT devices running Linux into remotely controlled bots that can be used as part of a botnet in large-scale network attacks.
If you have trouble with SSH connections breaking, Jack Wallen shows you how you can enjoy a bit more persistence with the help of Eternal Terminal.