Security News

North Korean hackers find another new target: The defense industry
2021-02-25 16:49

Kaspersky security researchers have found evidence that the North Korean hacking collective known as Lazarus has added another target to its list of victims: The defense industry, and companies in more than a dozen countries have already been affected. As previously reported by TechRepublic, Lazarus started off 2021 by targeting security researchers with offers of collaborating on malware research, only to infect victims with malware that could cause the theft of sensitive security-related data.

North Korean hackers target defense industry with custom malware
2021-02-25 16:14

A North Korean-backed hacking group has targeted the defense industry with custom backdoor malware dubbed ThreatNeedle since early 2020 with the end goal of collecting highly sensitive information. ThreatNeedle helped the Lazarus hackers to move laterally throughout the defense orgs' networks and harvest sensitive info that got exfiltrated to attacker-controlled servers using a custom tunneling tool via SSH tunnels to remote compromised South Korean servers.

CNAME-based tracking increasingly used to bypass browsers’ anti-tracking defenses
2021-02-24 14:16

As browser-makers move to defang third-party cookies, marketers are increasingly switching to alternative tracking techniques. In 2019, Firefox was equipped with Enhanced Tracking Protection by default, blocking known trackers, third-party tracking cookies and cryptomining scripts.

What's CNAME of your game? This DNS-based tracking defies your browser privacy defenses
2021-02-24 06:11

Boffins based in Belgium have found that a DNS-based technique for bypassing defenses against online tracking has become increasingly common and represents a growing threat to both privacy and security. In a research paper to be presented in July at the 21st Privacy Enhancing Technologies Symposium, KU Leuven-affiliated researchers Yana Dimova, Gunes Acar, Wouter Joosen, and Tom Van Goethem, and privacy consultant Lukasz Olejnik, delve into increasing adoption of CNAME-based tracking, which abuses DNS records to erase the distinction between first-party and third-party contexts.

Sequitur Labs EmSPARK Security Suite provides essential security defenses for IoT applications
2021-02-24 01:45

Sequitur Labs announced new packages for the EmSPARK Security Suite that allows manufacturers to secure embedded designs for industrial, consumer, smart home and health care applications quickly and painlessly. The EmSPARK Security Suite Base package provides essential security defenses for IoT applications in a turnkey solution that is easy to install, integrate and manage.

CyberSheath ensures compliance with new cybersecurity standards for defense contractors
2021-02-04 02:30

CyberSheath launched its Managed IT Services for Defense Contractors to ensure compliance with the new cybersecurity standards for commercial contractors of the United States government. The managed services include a Shared Security Compliance Framework to ensure compliance for both DFARS Clause 252.204-7012 / NIST SP 800-171 and the new DFARS 252.204-7019-7021 CMMC requirements.

Security chaos engineering helps you find weak links in your cyber defenses before attackers do
2021-02-01 11:48

Chaos engineering is a way for security teams to replace continuous firefighting with continuous learning, according to two industry experts. At the RSA 365 Virtual Summit this week, Aaron Rinehart, CTO and co-founder Verica, and Jamie Dicken, manager of applied security at Cardinal Health, explained how this approach to IT security works.

Don Heckman joins Guidehouse as Defense Cyber Solutions Leader
2021-01-10 23:45

Bringing more than 36 years of Department of Defense and Intelligence Community cybersecurity experience, Heckman will partner with clients to deliver cyber resilience for DoD policy, strategy, IT and weapon system cybersecurity. His focus encompasses all aspects of cyber and secure information sharing, ranging from innovative approaches to cyber strategy, policy, security architecture and engineering, to initiatives such as controls for IT modernization, Risk Management Framework transformation, identity and access management evolution and data protection.

Owl Cyber Defense acquires Trident ACS product line to enhance advanced network security capabilities
2021-01-08 01:15

Owl Cyber Defense Solutions announced the acquisition of the Trident Assured Collaboration Systems product line. The acquisition gives Owl a broader range of certified network perimeter defense solutions than any competitor in the market.

The 5G toolbox of defense
2021-01-06 05:30

The onset of 5G - which introduces new network architectures, services and devices - raises the stakes and increases the challenge for network operators. The European Union is one such organization taking the lead. It has analyzed numerous risk scenarios and has come up with a toolbox that outlines nine mitigating measures and supporting actions that member states and network operators can leverage to defend themselves.