Security News > 2022 > June

Tech pros have low confidence in supply chain security
2022-06-06 04:00

Tech pros have low confidence in supply chain security. Security threats have heightened the supply chain challenges enterprises have faced over the past two years, and a new ISACA survey report finds only 44% of IT professionals surveyed have high confidence in the security of their organization's supply chain.

Four steps to successful empathetic investigations
2022-06-06 04:00

How security conducts employee investigations needs to change. All too often, security investigations are an attempt to get an employee to admit to suspected wrongdoing.

Costa Rican government held up by ransomware … again
2022-06-06 03:46

Fresh off an intrusion by Conti last month, Costa Rica has been attacked by the Hive ransomware gang. Ransomware attacks have become 94.34 percent faster since 2019.

The costs and damages of DNS attacks
2022-06-06 03:30

EfficientIP has announced the findings of its eighth annual 2022 Global DNS Threat Report, conducted by IDC, which reveals the damaging impact Domain Name System attacks have had on global organizations' operations over the past 12 months. As enterprises continue to strike a balance between supporting remote workers and mitigating the network security risks posed by the rise in hybrid work models and reliance on cloud applications, the results show that 88% of organizations have experienced one or more DNS attacks on their business.

The Intigriti Ethical Hacker Survey 2022
2022-06-06 03:00

The Intigriti Ethical Hacker Survey 2022 is now available, highlighting how ethical hacking continues to grow as a popular career choice for all levels of security experts. For the second year running, Intigriti has gone into the field and spoken to a wide range of respondents of all levels of experience working in the fast-moving world of ethical hacking, bug bounty programs, and beyond.

Yandex CEO Arkady Volozh resigns after being added to EU sanctions list
2022-06-06 01:59

Arkady Volozh, CEO of Russia's biggest internet company Yandex, has resigned after being added to the European Union's list of individuals sanctioned as part of its response to the illegal invasion of Ukraine. Another issue is that Yandex's complex ownership structure means the EU feels Russia's government can veto the company's activities if they are felt to counter the national interest.

Adopting a Technology Rotation Program from Dell Improves Operational and Cost Efficiencies for Storage
2022-06-06 00:00

Dell storage customers interviewed are achieving a 60% savings over six years when they use Technology Rotation for their storage needs compared to purchasing the storage. To understand the benefits of storage refreshes and costs associated with aging storage infrastructure, IDC conducted two analyses based on interviews with study participants that.

Can’t Choose Between Public And Private Cloud? You Don’t Have To With IaaS
2022-06-06 00:00

In 2021, Dell, Intel, and VMware commissioned a custom study from Forrester Consulting to understand today's IT and business requirements for infrastructure, data storage, and application performance. We found that, though many businesses prefer to keep their infrastructure and data on-premises, they are adopting infrastructure-as-a-service to proactively optimize their deployment strategy across a hybrid of public cloud and private cloud infrastructure for IT and business gains.

What Decision Makers Can Do About Data Protection
2022-06-06 00:00

The mandate to protect data in the modern organization is wide-reaching, critical, and challenging. Data protection must be more than words in an employee code of conduct manual and cannot be left unevaluated while hoping for the best.

Chinese LuoYu Hackers Using Man-on-the-Side Attacks to Deploy WinDealer Backdoor
2022-06-05 19:39

An "Extremely sophisticated" Chinese-speaking advanced persistent threat actor dubbed LuoYu has been observed using a malicious Windows tool called WinDealer that's delivered by means of man-on-the-side attacks. "Such attacks are especially dangerous and devastating because they do not require any interaction with the target to lead to a successful infection."