Security News
BAE Systems has unveiled a next-generation cyber-threat detection and mitigation solution for U.S. military platforms. The system's cyber resilience capabilities can be integrated into ground, air, and space vehicles to protect our warfighters and platforms from cyber attacks designed to access and degrade mission capabilities.
Companies worldwide have continued to receive extortion emails threatening to launch a distributed denial-of-service attack on their network, unless they pay up - with British foreign-exchange company Travelex reportedly being one recent high-profile threat recipient. While the ransom DDoS campaign has been ongoing since August and has received widespread coverage, researchers with Radware said in a Wednesday post that they are continuing to see companies worldwide receive the extortion emails - and that attackers are becoming more sophisticated.
Intel on Wednesday talked up a set of security features planned for its promised third-generation Xeon Scalable Processors, code-named Ice Lake, which are supposed to show up before the end of the year. The chip biz said it's "Doubling down on its Security First Pledge," as if some sort of quantitative measurement of security could be calculated and weighed against prior security commitments.
Cyborg Security announced a new threat hunting content platform that will help businesses grapple with the exponential rise in cyber threats that strike their IT assets and maximize the value of their existing security controls. Cyborg Security's HUNTR platform has been developed by a world class team of threat hunting experts to deliver advanced threat hunting and detection content, empowering organizations to move beyond reactive security, to proactive threat hunting.
CPRA, the Californian GDPR? Set to appear on the November 2020 ballot, the CPRA, also known as CCPA 2.0 or Prop 24, builds on what is already the most comprehensive data protection law in the US. In essence, the CPRA will bring data protection in California nearer to the current European legal standard, the General Data Protection Regulation. Besides enhancing consumer rights, the CPRA also creates new provisions for employee data as it relates to their employers, as well as data that businesses collect from B2B business partners.
The PCI Security Standards Council and the ATM Industry Association issued a joint bulletin to highlight an increasing threat that requires urgent awareness and attention. An ATM cash-out attack is an elaborate and choreographed attack in which criminals breach a bank or payment card processor and manipulate fraud detection controls as well as alter customer accounts so there are no limits to withdraw money from numerous ATMs in a short period of time.
A new report from the industrial cybersecurity company Claroty details how US IT and OT security professionals see their organization's more of a target since early March, when the US pandemic shut down industry. Claroty's report, "The Critical Convergence of IT and OT Security in a Global Crisis," revealed that 60% of respondents believe their CISO demonstrated good leadership in the midst of a crisis, but also found that 86% said their organization's leadership made cybersecurity a priority during the pandemic and implemented appropriate training resources for the company's now dispersed workforce.
The three new features provide adaptive threat profiling for Juniper's ATP Cloud, the integration of WootCloud HyperContext for device profiling, and Secure Connect VPN for remote working beyond the branch office. Adaptive Threat Profiling makes use of Juniper's SRX series firewalls to act as sensors throughout the network.
Raytheon Intelligence & Space is launching a new hardware emulation and software analysis tool called DejaVM that provides a virtualized environment to evaluate and reduce cyber threats against mission-critical systems in a modern networked space. DejaVM enables system-level cyber testing without requiring access to the limited number of highly specialized physical hardware assets.
My company, MobileIron, wanted to better understand current QR code trends, so in September we conducted a survey of more than 2,100 consumers across the U.S. and the U.K. It confirmed that QR codes are indeed more widely used today. It's why, if mobile employees are using their personal devices to access business apps and scan potentially risky QR codes, enterprise IT should start taking a much closer look at their mobile security approach.