Security News
In the coming years, organizations will deploy, operate, and scale digital infrastructure to ensure consistent security, performance, and compliance across all resources, regardless of where and how they are deployed. These organizations will invest in more intelligent, autonomous operations and take advantage of flexible consumption and strategic vendor partnerships to promote agility and ensure that the business, and its digital infrastructure, can continue to perform in the face of a wide range of unexpected scenarios - social, geopolitical, economic, climate, or business related.
While cybersecurity firms are often the first port of call for business leaders desperate for answers, the crucial role of software providers should not be overlooked. The first step to understanding the importance of industrial software providers is realizing their central role in the cybersecurity ecosystem.
Ransomware attacks on industrial environments have increased by 500 per cent in three years, and it's unlikely the criminals responsible are going to slow down anytime soon. If cyber-attackers are smart, is it possible to beat them with something even smarter? Something like AI? And is it possible to predict what the next wave of attacks will look like and prepare now?
CISA and the NSA shared guidance on securing cloud-native 5G networks from attacks seeking to compromise information or deny access by taking down cloud infrastructure. The two federal agencies issued these recommendations for service providers and system integrators that build and configure 5G cloud infrastructure, including cloud service providers, core network equipment vendors, and mobile network operators.
It's a matter of going after those with deep pockets. Cloudflare was sued in November 2018 by Mon Cheri Bridals and Maggie Sottero Designs, two wedding dress manufacturers and sellers that alleged Cloudflare was guilty of contributory copyright infringement because it didn't terminate services for websites that infringed on the dressmakers' copyrighted designs.
CloudLinux launched a new open-core project - KuberLogic - software that allows DevOps to set up scalable, self-healing PaaS on top of your Kubernetes cluster. Available on GitHub, KuberLogic allows administrators to run and deploy key open-source components with simple configurations and high availability.
Spending on compute and storage infrastructure products for cloud infrastructure, including dedicated and shared environments, decreased 2.4% year over year in the second quarter of 2021 to $16.8 billion, according to IDC. This decrease comes after six quarters of year-over-year growth, and most notably compares to the 39.1% annual growth seen by the market in 2Q20, when the world just entered the pandemic with the first wave of business and country closures causing a spike in investments in cloud services and infrastructure. Investments in non-cloud infrastructure increased 3.4% year over year in 2Q21 to $13.4 billion recovering from a 7.2% decline in 2Q20. Spending on shared cloud infrastructure decreasing too.
Is the IoT technology that powers critical infrastructure really that vulnerable and what can be done to mitigate the risks? It is unsurprising that the vulnerability of IoT and the critical infrastructure landscape as a whole to cyberattacks is becoming a growing concern within the security landscape and recent attacks on the sector have proven the need to ramp up security efforts.
As many as 11 security vulnerabilities have been disclosed in Nagios network management systems, some of which could be chained to achieve pre-authenticated remote code execution with the highest privileges, as well as lead to credential theft and phishing attacks. Industrial cybersecurity firm Claroty, which discovered the flaws, said flaws in tools such as Nagios make them an attractive target owing to their "Oversight of core servers, devices, and other critical components in the enterprise network." The issues have since been fixed in updates released in August with Nagios XI 5.8.5 or above, Nagios XI Switch Wizard 2.5.7 or above, Nagios XI Docker Wizard 1.13 or above, and Nagios XI WatchGuard 1.4.8 or above.
Researchers have unearthed 11 vulnerabilities affecting Nagios XI, a widely used enterprise IT infrastructure/network monitoring solution, some of which can be chained to allow remote code execution with root privileges on the underlying system.Attackers are likely to try to exploit vulnerabilities in network management systems like Nagios because their oversee critical network components and core servers and often contain many network secrets so they can do their job, Claroty researchers noted.