Security News > 2022 > February

Cambodia cans critics of its snoopy Internet Gateway, says every nation has one
2022-02-15 06:58

Cambodia's Ministry of Foreign Affairs and International Cooperation has issued a clarification about the role of the "National Internet Gateway" that will commence operations tomorrow, stating that descriptions of it as an instrument of pervasive surveillance are "Unfounded." A Ministry spokesperson insists the Gateway is actually an instrument to "Strengthen national security and tax collection as well as to maintain social order and protect national culture."

Qualys Context XDR: Bringing context to an organization’s security efforts
2022-02-15 06:30

To help incident response and threat hunting teams navigate this complex environment, Qualys has unveiled its Qualys Context XDR. In this interview with Help Net Security, Jim Wojno, Senior Director of XDR at Qualys, explains the advantages of using Qualys Context XDR and how it can provide clarity through context. Qualys Context XDR is uniquely positioned to address this issue by providing deep and meaningful context to the barrage of security events by correlating rich asset inventory and vulnerability context; network endpoint telemetry from Qualys sensors and; high-quality threat intelligence and third-party log data.

Log4Shell: A retrospective
2022-02-15 06:15

There were a few common practices in organizations that felt they had prepared for or responded to Log4Shell effectively. On the other hand, centralized logging inevitably provides a broader attack surface for logging-based attacks such as Log4Shell.

Energy, oil and utility sector most likely to pay ransoms
2022-02-15 06:00

CyberSaint announced the release of a report which identifies which sectors pay the most in ransom, have the propensity to pay and delves into the future of ransomware. Since these sectors provide vital services, organizations are more likely to pay the ransom to protect the stolen data and restore provided services.

Critical Security Flaws Reported in Moxa MXview Network Management Software
2022-02-15 05:42

Technical details have been disclosed regarding a number of security vulnerabilities affecting Moxa's MXview web-based network management system, some of which could be chained by an unauthenticated adversary to achieve remote code execution on unpatched servers. The five security weaknesses "Could allow a remote, unauthenticated attacker to execute code on the hosting machine with the highest privileges available: NT AUTHORITYSYSTEM," Claroty security researcher Noam Moshe said in a report published this week.

Experts Warn of Hacking Group Targeting Aviation and Defense Sectors
2022-02-15 05:41

Entities in the aviation, aerospace, transportation, manufacturing, and defense industries have been targeted by a persistent threat group since at least 2017 as part of a string of spear-phishing campaigns mounted to deliver a variety of remote access trojans on compromised systems. The use of commodity malware such as AsyncRAT and NetWire, among others, has led enterprise security firm Proofpoint to a "Cybercriminal threat actor" codenamed TA2541 that employs "Broad targeting with high volume messages." The ultimate objective of the intrusions is unknown as yet.

The rise of the super malicious insider: Yes, we need to worry
2022-02-15 05:30

DTEX Systems announced the release of a report which identifies a significant increase in industrial espionage incidents and the rise of the super malicious insider persona, and provides evidence that the abrupt shift to remote work has directly contributed to an escalation in psychosocial human behaviors that create organizational risk. The rise of malicious insider incidents The super malicious insider accounted for 32% of malicious insider incidents investigated in 2021.

SafeDNS: Cloud-based Internet Security and Web Filtering Solution for MSPs
2022-02-15 05:16

Why is a web filtering important and what are the main features necessary for MSPs? Managed service providers have been struggling with finding the right web filtering solutions. Web filtering is necessary for businesses because it prevents the staff from accessing malicious and harmful content while using the corporate network or while working from home, besides offering other advantages like monitoring their performance and keeping it to the maximum to ensure productivity.

The importance of implementing a zero trust strategy
2022-02-15 05:00

Optiv has published a report based on a recent survey of cybersecurity leaders that highlights the critical importance of implementing zero trust as an effective way to reduce cyber risk. Respondents cited zero trust as one of the most effective security practices, and 100% acknowledged it as important in reducing their organization's cyber risk.

Soaring losses accelerate investments in anti-fraud tech
2022-02-15 04:30

Faced with a seemingly endless onslaught of schemes and scams, anti-fraud pros have doubled down on analytics, finds the latest anti-fraud technology study by the Association of Certified Fraud Examiners and SAS. Based on survey responses from nearly 900 ACFE members worldwide, the report illuminates how organizations across sectors are using technology to fight fraud. "Navigating the pandemic-forged business landscape, we've seen increased reports of fraud - a trend we don't expect to slow any time soon," said Bruce Dorris, J.D., CFE, CPA, President and CEO of the ACFE. "To stay ahead of not only the increased volume of fraud instances, but also emerging trends, it's critical for organizations to be flexible and proactive in adopting new anti-fraud tools and processes."