Security News > 2022 > March

As big tech companies from the West swiftly and happily comply with new rules that prohibit interactions with Russia, Chinese companies will soon feel pressure to do likewise - and counter-pressure to resist such calls. In early February, Russia and China re-affirmed their relationship as having "No limits" and essentially declared they are best friends forever.

The fact of the matter is history has proven to us that VPNs are vulnerable to compromise - the VPNs themselves because of vulnerabilities in their code or traditional attacks like account takeover when multifactor authentication isn't enabled. The pandemic forced companies to quickly issue VPN licenses to their entire workforce or, in the absence of VPNs in place, even deployed remote desktop protocol servers, which is even worse.

To select a suitable CDR solution, you need to think about a variety of factors. Benny Czarny, CEO, OPSWAT. As malware evolves and file-based attack techniques become more complex, selecting CDR technology is not a simple check-off-the-box exercise for organizations - especially with the growing number of CDR vendors in the market.

Guarding intellectual property has always been a priority for medical device manufacturers as competitors and even nation states are constantly trying to compromise or steal IP. For example, in January 2019, a Chinese national who stole secrets while working for medical device companies including Medtronic and Edwards, was sentenced to over two years in federal prison. Medical device companies face a very competitive environment, increasing the incentive for IP theft.

Deep Instinct Threat Research team extensively monitored attack volumes and types and then extrapolated their findings to predict where the future of cybersecurity is heading, determine what motivates attackers, and most importantly, lays out the steps organizations can take now in order to protect themselves in the future. One of the most pronounced takeaways from this research on 2021 threat trends is that bad actors are becoming more successful at evading AI/ML technologies, prompting organizations to redouble efforts in the innovation race.

The recently identified vulnerability in the Log4j Java logging package has created headaches for security professionals around the world. Log4j vulnerability reduced security professionals' trust in open-source tools.

United States president Joe Biden has used his first State of the Union speech to call for a ban on social networks serving ads targeted at children. Speaking in the presence of Facebook whistleblower Frances Haugen, who was invited to attend by first lady Jill Biden, the president said "We must hold social media platforms accountable for the national experiment they're conducting on our children for profit."

McAfee unveiled two survey reports which reveal the level of disconnect that exists between generations over how safe mobile devices are and how vulnerable consumers are to threats on those devices. "The common thread linking these two research offerings are that consumers value protection of their data, privacy, and identity. As our use of mobile devices rapidly increases, we must remember that a mobile device is a connected device, just like a computer."

The global 5G IoT market size was valued at $1.4 billion in 2020 and is projected to reach $111.2 billion by 2028, growing at a CAGR of 72.1% from 2021 to 2028, according to Verified Market Research. Rising demand for IoT connected devices, more adoption of mobile broadband as well as a growing device-to-device communication, and swift innovation virtualization in the networking domain is driving the growth of the 5G Technology Market.

Over the course of 2021 we saw an increase in multiple attack approaches; some old, some new. In an upcoming webinar, Cybersecurity company Cynet will provide an in-depth review of the high-profile attacks we saw in 2021 and provide guidance to cybersecurity professionals for 2022.