Security News > 2021

Vulnerability in 'Domain Time II' Could Lead to Server, Network Compromise
2021-04-08 10:50

A vulnerability residing in the "Domain Time II" network time solution can be exploited in Man-on-the-Side attacks, cyber-security firm GRIMM warned on Tuesday. Developed by Greyware Automation Products, Inc., Domain Time II is a time synchronization software designed to help enterprises ensure accurate time across their networks.

Belgian police seize 28 tons of cocaine after 'cracking' Sky ECC's chat app encryption
2021-04-08 10:39

The Belgian plod says it seized 27.64 tons of cocaine worth €1.4bn from shipments into Antwerp in the past six weeks after defeating the encryption in the Sky ECC chat app to read drug smugglers' messages. "During a judicial investigation into a potential service criminal organization suspected of knowingly providing encrypted telephones to the criminal environment, police specialists managed to crack the encrypted messages from Sky ECC," the Belgian police claimed, CNN reports.

There’s a whole wide world of web application firewall options – so how do you choose the right one?
2021-04-08 07:30

If you've got an application which faces the web, no one would dispute that you should probably have a web application firewall sitting in front of it. Web apps, after all, are the leading cause of security breaches, and the web application firewall is first line of defence, preventing bad actors getting in in the first place, and then leaving with whatever goodies they've found.

MITRE Madness: A Guide to Weathering the Upcoming Vendor Positioning Storm
2021-04-08 06:39

April is usually a whirlwind month for the cybersecurity industry as it coincides with the release of the highly regarded and influential MITRE ATT&CK test results. The result is a storm of spin and PR that is hard to navigate.

NIST and HIPAA: Is There a Password Connection?
2021-04-08 05:47

While companies uphold their own password standards, outside forces like HIPAA and NIST have a heavy influence. Notably, an admin complying with NIST standards might define necessary password policies to enforce minimum length and leaked password filtering requirements.

4 things you can do to minimize cyberattacks on supply and value chains
2021-04-08 05:15

Supply chain attacks target the weakest spot in most every enterprise's security program: third-party access. The SolarWinds hack was a classic supply chain attack, compromising downstream organizations in order to traverse the victim's extended enterprise of customers, suppliers, vendors and other third parties to gain unauthorized access to their on-premises and cloud systems.

Cloud-native watering hole attack: Simple and potentially devastating
2021-04-08 05:12

As cloud technologies become more varied and omnipresent and as cloud stacks become increasingly modular and layered, we're going to see a higher rate of full-on attacks. This clearly meets a critical need, but also opens up potential security compromises, including cloud-native watering hole attack risks.

A rush to remote working leaving businesses vulnerable to cybercriminals
2021-04-08 05:00

The COVID-19 pandemic forced businesses to quickly support remote working practices, often without proper security measures in place. Forty-nine percent of businesses surveyed stressed that changes made to remote working practices during lockdown adversely affected their company's cybersecurity.

Cybercriminals are using Telegram bots, Google Forms to gather stolen user data
2021-04-08 04:45

Cybercriminals are increasingly using legitimate services such as Google Forms and Telegram to gather user data stolen on phishing websites. Alternative ways to collect data help cybercriminals keep it safe and start using the information immediately, says Group-IB. In addition, ready-to-go platforms that automate phishing and which are available on the darknet also have Telegram bots at their core, with admin panel that is used to manage the entire process of the phishing attack and keep financial records linked to them.

Businesses shifting to remote work need to focus on securing endpoint devices
2021-04-08 04:30

Forrester Consulting conducted a study that shines a light on the increasingly complex realities of digital transformation, its impact on enterprise endpoint security for remote and hybrid workforces, and the need for proactive endpoint resilience strategies. "With remote and hybrid work environments solidifying their place in long-term business plans and operating models, there's never been a greater need for endpoint security solutions that enable resilience, healing, and operational agility," said Christy Wyatt, CEO at Absolute.