Security News

Leaseweb is restoring ‘critical’ systems after security breach
2023-08-25 14:59

Leaseweb, one of the world's largest cloud and hosting providers, notified people that it's working on restoring "Critical" systems disabled following a recent security breach.Leaseweb took down some of the impacted systems to mitigate security risks and says that its teams are now working to restore critical systems affected in this incident.

Google Workspace: New account security, DLP capabilities announced
2023-08-25 04:38

New capabilities in Google Workspace will help enterprises improve account and data security, by making unauthorized takeover of admin and user accounts and exfiltration of sensitive data more difficult. A multi-party approval request in Google Workspace Admin console.

IEEE 802.11az provides security enhancements, solves longstanding problems
2023-08-25 04:00

IEEE 802.11az integrates positioning protocols to mainstream IEEE 802.11ax, while providing additional benefits such as security and authenticity, 2x to 4x improved accuracy and coverage, 10x improved power efficiency, and dramatic improvement to scalability. What is the evolutionary significance of the IEEE 802.11az standard, or Next Generation Positioning, in the context of the IEEE 802.11 series?

Last call for mWISE, the security conference for frontline practitioners.
2023-08-24 14:02

mWISE is unique among security conferences in its highly collaborative agenda. The 2023 lineup covers topics in cloud security, intelligence, security engineering, security operations, threats and exploits, and third-party and cyber risk management, along with a sponsor track.

WinRAR Security Flaw Exploited in Zero-Day Attacks to Target Traders
2023-08-24 11:12

A recently patched security flaw in the popular WinRAR archiving software has been exploited as a zero-day since April 2023, new findings from Group-IB reveal. The vulnerability, cataloged as CVE-2023-38831, allows threat actors to spoof file extensions, thereby making it possible to launch malicious scripts contained within an archive that masquerades as seemingly innocuous image or text files.

Webinar: The external attack surface & AI’s role in proactive security
2023-08-24 02:30

The enterprise perimeter is now a massively decentralized IT landscape characterized by large-scale adoption of cloud platforms, digital services, and an increasingly tangled digital supply chain. Regulators are on the march as new threat actors emerge, exploiting increasingly sophisticated attack vectors to compromise organizations faster.

The MOVEit hack and what it taught us about application security
2023-08-23 14:01

The MOVEit hack was not the same as classic ransomware attacks for which groups like Clop initially gained notoriety. Emerging digital forensic analysis from the aftermath of MOVEit suggests the hackers knew about the zero-day flaw in MOVEit as far back as 2021 when they tested it out covertly to see how much access they could get.

Security Onion 2.4: Free, open platform for defenders gets huge update
2023-08-23 09:55

Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management.It has been downloaded over 2 million times and is being used by security teams worldwide.

Cybercriminals turn to AI to bypass modern email security measures
2023-08-23 03:30

Cybercriminals employ artificial intelligence to create complex email threats like phishing and business email compromise attacks, while modern email security systems use AI to counter these attacks, according to Perception Point and Osterman Research. Cybercriminals have shown rapid adoption of AI tools to their favor with 91.1% of organizations reporting that they have already encountered email attacks that have been enhanced by AI, and 84.3% expecting that AI will continue to be utilized to circumvent existing security systems.

IT’s rising role in physical security technology
2023-08-22 04:30

In the modern world it's become increasingly likely that virtual systems and IT-adjacent technologies are utilized to manage and control installed physical security devices, meaning that an effective and safe security system must be designed with input from both physical security and IT teams. In a newly converged cloud-based security system, IT staff may attempt to access and adjust physical security hardware in line with their own set of internal policies, accidentally exposing exploits or vulnerabilities that were previously covered only by physical security protocols.