Security News > 2021

Ever felt that a few big tech companies are following you around the internet? That's because ... they are
2021-02-25 12:04

A new extension for Google Chrome has made explicit how most popular sites on the internet load resources from one or more of Google, Facebook, Microsoft and Amazon. The extension, Big Tech Detective, shows the extent to which websites exchange data with these four companies by reporting on them.

Hackers Scanning for VMware vCenter Servers Affected by Critical Vulnerability
2021-02-25 11:47

Just one day after VMware announced the availability of patches for a critical vulnerability affecting vCenter Server, hackers have started scanning the internet for vulnerable servers. The flaw, tracked as CVE-2021-21972, affects the vSphere Client component of vCenter Server and it can be exploited by a remote, unauthenticated attacker to execute arbitrary commands with elevated privileges on the operating system that hosts vCenter Server.

Attackers are looking to exploit critical VMware vCenter Server RCE flaw, patch ASAP!
2021-02-25 10:53

The day after VMware released fixes for a critical RCE flaw found in a default vCenter Server plugin, opportunistic attackers began searching for publicly accessible vulnerable systems. We've detected mass scanning activity targeting vulnerable VMware vCenter servers.

Russian Hackers Targeted Ukraine Authorities With Supply-Chain Malware Attack
2021-02-25 08:58

Ukraine is formally pointing fingers at Russian hackers for hacking into one of its government systems and attempting to plant and distribute malicious documents that would install malware on target systems of public authorities. "The purpose of the attack was the mass contamination of information resources of public authorities, as this system is used for the circulation of documents in most public authorities," the National Security and Defense Council of Ukraine said in a statement published on Wednesday.

Alexa, swap out this code that Amazon approved for malware... Installed Skills can double-cross their users
2021-02-25 07:04

In research presented on Wednesday at the Network and Distributed System Security Symposium conference, researchers describe flaws in the process Amazon uses to review third-party Alexa applications known as Skills. "We show that not only can a malicious user publish a Skill under any arbitrary developer/company name, but she can also make backend code changes after approval to coax users into revealing unwanted information," the academics explain in their paper, titled "Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem." [PDF].

Why enterprises need rugged devices with integrated endpoint management systems
2021-02-25 06:00

The debate within business organizations of whether to use consumer devices or to invest in rugged devices for the operations side of their business is as old as personal computing itself. Further, planned obsolescence in these devices, frequent software updates, and batteries that are difficult or impossible to swap-out also make consumer devices a risky investment for businesses who count on their endpoint devices to work hard for years before needing to be replaced.

Five factors driving investment in IDV
2021-02-25 05:30

With vast numbers of people forced online to access healthcare and financial services, purchase groceries and consume entertainment, the ability to verify and protect digital identity has become central to everyone's ability to survive and function during the pandemic. Think about the millions of people that are now using digital services for the first time, whether that's shopping for groceries, banking and paying bills or accessing online healthcare services.

Attackers disrupting COVID-19 efforts and critical supply chains
2021-02-25 05:00

In 2020 attackers were observed pivoting their attacks to businesses for which global COVID-19 response efforts heavily relied, such as hospitals, medical and pharmaceutical manufacturers, as well as energy companies powering the COVID-19 supply chain. "In essence, the pandemic reshaped what is considered critical infrastructure today, and attackers took note. Many organizations were pushed to the front lines of response efforts for the first time - whether to support COVID-19 research, uphold vaccine and food supply chains, or produce personal protective equipment," said Nick Rossmann, Global Threat Intelligence Lead, IBM Security X-Force.

C-level executives driving the adoption of MACH across their organizations
2021-02-25 04:30

Eighty-one percent of respondents expressed the strong intention to increase MACH elements in their front-office architecture in the next 12-months. Customer demands are key driver toward greater MACH adoption.

Google Discloses Details of Remote Code Execution Vulnerability in Windows
2021-02-25 04:28

Google's cybersecurity research unit Project Zero on Wednesday disclosed the details of a recently patched Windows vulnerability that can be exploited for remote code execution. Dominik Röttsches of Google and Mateusz Jurczyk of Google Project Zero have been credited for reporting the issue to Microsoft.