Security News > 2021

Mamba Ransomware Leverages DiskCryptor for Encryption, FBI Warns
2021-03-25 15:36

The Federal Bureau of Investigation this week published an alert to warn of the fact that the Mamba ransomware is abusing the DiskCryptor open source tool to encrypt entire drives, including the operating system. The Mamba ransomware is abusing the open source application for malicious purposes, and has been doing so in a multitude of attacks.

Feedzai Lands $200M in Series C Funding
2021-03-25 15:21

Feedzai, a late-stage fintech startup, is the latest entrant into cybersecurity's unicorn club after snagging a new $200 million funding round that values the company at more than $1 billion. The San Mateo, Calif.- based Feedzai said the latest Series D round was led by KKR, one of the most prominent global investment firms.

OpenSSL 1.1.1k Patches Two High-Severity Vulnerabilities
2021-03-25 15:16

The OpenSSL Project on Thursday announced the release of version 1.1.1k, which patches two high-severity vulnerabilities, including one related to verifying a certificate chain and one that can lead to a server crash. "Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates," the OpenSSL Project explained in its advisory.

How to protect your organization and yourself from cryptocurrency scams
2021-03-25 15:06

Crypto scams are on the rise due to the growing popularity of cryptocurrencies and the number of people in need of financial assistance during COVID-19, says Bolster. Fully aware of this transition, cybercriminals are targeting more people and organizations with cryptocurrency scams.

IBM launches new services to simplify hybrid cloud security
2021-03-25 15:01

IBM announced on Wednesday the launch of new and enhanced services to help simplify security for the hybrid cloud. The suite of services will help businesses manage their cloud security strategy, policies and controls across hybrid cloud environments by bringing together cloud-native, IBM and third-party technologies with IBM expertise to assist organizations in the creation of a unified security approach across their cloud ecosystems.

QNAP warns of ongoing brute-force attacks against NAS devices
2021-03-25 14:58

QNAP warns customers of ongoing attacks targeting QNAP NAS devices and urges them to enhance their security as soon as possible. In these attacks, the threat actors use automated tools to login into Internet-exposed NAS devices using passwords generated on the spot or from lists of previously compromised credentials.

Defence Industrial Strategy suggests the UK is ready to start taking its homegrown infosec industry seriously
2021-03-25 14:48

In a change from its recent bombastic blather, the British government has published a new Defence Industrial Strategy that looks like it wants to put the infosec industry on a gold-plated pedestal. "Government also needs to provide complementary support to industry and ensure that the public sector can access the right skills to remain an intelligent customer," said the Defence and Security Industrial Strategy whitepaper published this week.

Hackers Start Exploiting Recent Vulnerabilities in Thrive Theme WordPress Plugins
2021-03-25 14:31

Over 100,000 WordPress websites could be exposed to attacks targeting a couple of recently addressed vulnerabilities affecting Thrive Theme plugins, warns the Wordfence Threat Intelligence Team at WordPress security company Defiant. The Thrive Themes represent a collection of themes and plugins that provide WordPress administrators with the means to quickly customize their websites.

5 Things IT Should Ask Managed Security Providers
2021-03-25 13:58

Over the past five years of running a managed security service offering, I've received no shortage of questions and requests from customers. Regardless of the question, it's important for managed security providers to listen to their customers and accept feedback, whether it's positive or negative.

5 tips for implementing a zero trust model
2021-03-25 13:55

One option that is often touted is a zero trust model through which access to critical resources is scaled back and granted only under specific conditions. Sponsored by CyberArk, "The CISO View 2021 Survey: Zero Trust and Privileged Access report" collected the advice based on interviews with 12 top security executives from Global 1000 companies.