Security News

Teamviewer pulls update after users report connection issues
2022-11-02 16:51

TeamViewer has pulled the latest version following user reports that the remote access software was displaying "Connection not established. Authentication Cancelled Error" errors and blocking incoming connections. According to customers, these connection issues affect any device running TeamViewer 15.35.7, regardless of the software and hardware configuration.

2022 cyber threat report details growing trends
2022-10-27 17:46

SonicWall Capture Labs threat researchers recorded 2.8 billion malware hits, in the first half of 2022. Except for June, the global malware detection has been higher in 2022 when compared to 2021.

2022 State of Operational Technology and Cybersecurity Report
2022-10-20 00:00

You will also receive a complimentary subscription to TechRepublic's News and Special Offers newsletter and the Top Story of the Day newsletter. You may unsubscribe from these newsletters at any time.

The State of Zero Trust Report
2022-10-12 00:00

The zero-trust network security model has become a pervasive topic for IT professionals. Many organizations have a vision of what they want or need in terms of zero-trust and zero-trust network access, but the completeness of their vision isn't necessarily being translated into the solutions they're able to put in place.

New Report Uncovers Emotet's Delivery and Evasion Techniques Used in Recent Attacks
2022-10-10 13:10

Threat actors associated with the notorious Emotet malware are continually shifting their tactics and command-and-control infrastructure to escape detection, according to new research from VMware. "The ongoing adaptation of Emotet's execution chain is one reason the malware has been successful for so long," researchers from VMware's Threat Analysis Unit said in a report shared with The Hacker News.

Researchers Report Supply Chain Vulnerability in Packagist PHP Repository
2022-10-04 15:09

Researchers have disclosed details about a now-patched high-severity security flaw in Packagist, a PHP software package repository, that could have been exploited to mount software supply chain attacks. Packagist is used by the PHP package manager Composer to determine and download software dependencies that are included by developers in their projects.

Microsoft to let Office 365 users report Teams phishing messages
2022-10-01 15:06

Microsoft is working on updating Microsoft Defender for Office 365 to allow Microsoft Teams users to alert their organization's security team of any dodgy messages they receive.Microsoft Defender for Office 365 protects organizations from malicious threats from email messages, links, and collaboration tools.

New Report on IoT Security
2022-09-27 11:15

The Atlantic Council has published a report on securing the Internet of Things: "Security in the Billions: Toward a Multinational Strategy to Better Secure the IoT Ecosystem." The report examines the regulatory approaches taken by four countries-the US, the UK, Australia, and Singapore-to secure home, medical, and networking/telecommunications devices. The report recommends that regulators should 1) enforce minimum security standards for manufacturers of IoT devices, 2) incentivize higher levels of security through public contracting, and 3) try to align IoT standards internationally.

Top 8 takeaways from the VMWare Cybersecurity Threat Report
2022-09-20 14:06

According to VMware, such movements were observed in 25% of all attacks. One of the best things that organizations can do to counter these types of attacks is to look for ways to improve overall visibility.

LastPass source code breach – incident response report released
2022-09-19 18:59

The big story from last month was the LastPass breach, in which an attacker apparently got access to just one part of the LastPass network, but was able to make off with the company's proprietary source code. LastPass has now published an official follow-up report on the incident, based on what it has been able to figure out about the attack and the attackers in the aftermath of the intrusion.