Security News > 2021
A vulnerability residing in the "Domain Time II" network time solution can be exploited in Man-on-the-Side attacks, cyber-security firm GRIMM warned on Tuesday. Developed by Greyware Automation Products, Inc., Domain Time II is a time synchronization software designed to help enterprises ensure accurate time across their networks.
The Belgian plod says it seized 27.64 tons of cocaine worth €1.4bn from shipments into Antwerp in the past six weeks after defeating the encryption in the Sky ECC chat app to read drug smugglers' messages. "During a judicial investigation into a potential service criminal organization suspected of knowingly providing encrypted telephones to the criminal environment, police specialists managed to crack the encrypted messages from Sky ECC," the Belgian police claimed, CNN reports.
There’s a whole wide world of web application firewall options – so how do you choose the right one?
If you've got an application which faces the web, no one would dispute that you should probably have a web application firewall sitting in front of it. Web apps, after all, are the leading cause of security breaches, and the web application firewall is first line of defence, preventing bad actors getting in in the first place, and then leaving with whatever goodies they've found.
April is usually a whirlwind month for the cybersecurity industry as it coincides with the release of the highly regarded and influential MITRE ATT&CK test results. The result is a storm of spin and PR that is hard to navigate.
While companies uphold their own password standards, outside forces like HIPAA and NIST have a heavy influence. Notably, an admin complying with NIST standards might define necessary password policies to enforce minimum length and leaked password filtering requirements.
Supply chain attacks target the weakest spot in most every enterprise's security program: third-party access. The SolarWinds hack was a classic supply chain attack, compromising downstream organizations in order to traverse the victim's extended enterprise of customers, suppliers, vendors and other third parties to gain unauthorized access to their on-premises and cloud systems.
As cloud technologies become more varied and omnipresent and as cloud stacks become increasingly modular and layered, we're going to see a higher rate of full-on attacks. This clearly meets a critical need, but also opens up potential security compromises, including cloud-native watering hole attack risks.
The COVID-19 pandemic forced businesses to quickly support remote working practices, often without proper security measures in place. Forty-nine percent of businesses surveyed stressed that changes made to remote working practices during lockdown adversely affected their company's cybersecurity.
Cybercriminals are increasingly using legitimate services such as Google Forms and Telegram to gather user data stolen on phishing websites. Alternative ways to collect data help cybercriminals keep it safe and start using the information immediately, says Group-IB. In addition, ready-to-go platforms that automate phishing and which are available on the darknet also have Telegram bots at their core, with admin panel that is used to manage the entire process of the phishing attack and keep financial records linked to them.
Forrester Consulting conducted a study that shines a light on the increasingly complex realities of digital transformation, its impact on enterprise endpoint security for remote and hybrid workforces, and the need for proactive endpoint resilience strategies. "With remote and hybrid work environments solidifying their place in long-term business plans and operating models, there's never been a greater need for endpoint security solutions that enable resilience, healing, and operational agility," said Christy Wyatt, CEO at Absolute.