Security News > 2022 > February > Week in review: Malware targeting Linux-based OSes, Log4j exploitation risk

Week in review: Malware targeting Linux-based OSes, Log4j exploitation risk
2022-02-13 09:00

Contextualizing supply chain risks in a SaaS environmentIn the wake of the SolarWinds and Kaseya attacks, third-party cybersecurity risks remain top of mind for security leaders.

The four types of remote workers your security awareness program must addressNo matter how much technology you acquire or how many specific technical controls you install, when it comes to your information security awareness program, the most important control to tune within your environment is your people.

It's called Virtual Machine Threat Detection, and will help select Security Command Center customers detect cryptomining malware inside their virtual machines.

Highly Evasive Adaptive Threats bypassing traditional security defensesMenlo Security announced it has identified a surge in cyberthreats, termed Highly Evasive Adaptive Threats, that bypass traditional security defenses.

Why security strategies need a new perspectiveWhen it comes to designing a cybersecurity strategy, it makes sense to move beyond all the noise about the latest and most sophisticated attacks and the latest and most sophisticated security solutions, and focus attention on the employees instead - but not necessarily on the current staff.

Disaster recovery is critical for business continuityIn this interview with Help Net Security, Joe Noonan, a product executive that oversees the full backup and disaster recovery suite at Kaseya, which includes Unitrends, Spanning and all Kaseya-branded backup solutions, talks about the present and future of BCDR. Low code applications are essential for cybersecurity development in applicationsOne of the biggest changes to the cybersecurity landscape is that developers are now often expected to implement security directly into the applications they're building as part of the automated development lifecycle, rather than relying on security or ops teams configuring policies for them after they are built.


News URL

https://www.helpnetsecurity.com/2022/02/13/week-in-review-malware-targeting-linux-based-oses-log4j-exploitation-risk/