Security News

Why every company needs a DDoS response plan
2024-07-01 05:00

Today's DDoS attacks are not what they were even a few years ago, and we continue to see DDoS attacks that are framed as the largest in history. Given the rising number of DDoS attacks each year and the reality that DDoS attacks are frequently used in more sophisticated hacking attempts to apply maximum pressure on victims, a DDoS response plan should be included in every company's cybersecurity tool kit.

Indonesian government didn't have backups of ransomwared data, because DR was only an option
2024-07-01 04:56

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Portainer: Open-source Docker and Kubernetes management
2024-07-01 04:30

Portainer Community Edition is an open-source, lightweight service delivery platform for containerized applications. "I created Portainer, initially for my own needs. Back in 2016 I was operating a Public Cloud provider in Asia, and wanted to offer a Container as a Service solution to market. At the time, that meant Docker. There were no Cloud Provider management UI's for Docker then, so I created Portainer to act as such. In a way, Portainer enabled a domestic market version of AWS ECS before ECS was popular. However, Portainer quickly took on a life of its own. I open-sourced the UI, which was"discovered" and blogged about, and it took off.

Product showcase: Protect digital identities with Swissbit’s iShield Key Pro
2024-07-01 04:00

The iShield Key Pro series from Swissbit addresses these challenges by offering top-notch security combined with effortless usability. The iShield Key Pro series makes this a reality, offering a powerful hardware security token designed to simplify your daily tasks while significantly enhancing your digital security posture.

Microsoft tells yet more customers their emails have been stolen
2024-07-01 03:35

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Preparing for Q-Day as NIST nears approval of PQC standards
2024-07-01 03:30

While estimates just a few years old suggested that a quantum computer capable of running Shor's Algorithm would not be operationally available until 2029 or later, more recent research to produce fault-tolerant quantum systems, such as the 48 qubit system produced by a team at Harvard, combined with news of PsiQuantum's million qubit system slated to come online in 2027, suggest that the Q-Day horizon, however secretively or publicly it plays out, is coming faster than most anticipated. According to NIST, the "Goal of post-quantum cryptography is to develop cryptographic systems that are secure against both quantum and classical computers and can interoperate with existing communications protocols and networks." In July 2022, NIST published four draft PQC algorithms.

Infosec products of the month: June 2024
2024-07-01 02:45

SailPoint Risk Connectors helps organizations identify and act on risks. As part of its Atlas platform, SailPoint Risk Connectors makes it easier for organizations to make informed access decisions based on an identity's third-party risk scores.

Google Chrome to let Isolated Web App access sensitive USB devices
2024-06-30 21:17

Google is working on a new Unrestricted WebUSB feature, which allows trusted isolated web apps to bypass security restrictions in the WebUSB API. WebUSB is a JavaScript API that allows web applications to access local USB devices on a computer. Google is now testing an "Unrestricted WebUSB" feature that allows Isolated Web Apps to access these restricted devices and interfaces.

Juniper releases out-of-cycle fix for max severity auth bypass flaw
2024-06-30 15:14

Juniper Networks has released an emergency update to address a maximum severity vulnerability that leads to authentication bypass in Session Smart Router, Session Smart Conductor, and WAN Assurance Router products. "An Authentication Bypass Using an Alternate Path or Channel vulnerability in Juniper Networks Session Smart Router or Conductor running with a redundant peer allows a network-based attacker to bypass authentication and take full control of the device," reads the description of the vulnerability.

Dev rejects CVE severity, makes his GitHub repo read-only
2024-06-30 14:31

Fedor Indutny, due to a CVE report filed against his project, started getting hounded by people on the internet bringing the vulnerability to his attention. In recent times, open-source developers have been met with an uptick in receiving debatable or, in some cases, outright bogus CVE reports filed for their projects without confirmation.