Security News

Embedded IoT security threats and challenges
2022-09-29 05:30

IoT embedded systems combine hardware, firmware, and internet connectivity to carry out particular functions. These devices transfer real-time data via the internet for various purposes, including tracking, monitoring, and analysis.

Cloud security trends: What makes cloud infrastructure vulnerable to threats?
2022-09-29 04:30

The X-Force report pulls data from IBM's threat visibility, including X-Force Threat Intelligence data, hundreds of penetration tests, incident response engagements, and data provided by report contributor Intezer between July 2021 and June 2022. Cloud vulnerabilities are on the rise - Amid a sixfold increase in new cloud vulnerabilities over the past six years, 26% of cloud compromises that X-Force responded to were caused by attackers exploiting unpatched vulnerabilities, becoming the most common entry point observed.

Wolfi Linux provides the control needed to fix modern supply chain threats
2022-09-28 03:30

There's been a massive push for supply chain security in the last few years: integrity protection, vulnerability management, and transparency. This push has left organizations struggling to secure their pipelines and manage vulnerabilities, especially when running in the cloud.

5 Network Security Threats And How To Protect Yourself
2022-09-26 10:30

Applying patches to fix these vulnerabilities across an organisation's entire network of devices can be time-consuming and complex to implement - but it is essential. The previous two threats are usually exploited to breach networks and steal information, but a Denial-of-Service attack is meant to shut down your network and make it inaccessible.

Email-based threats: A pain point for organizations
2022-09-22 04:30

In this Help Net Security video, Igal Lytzki, Incident Response Analyst at Perception Point, discusses a recent Remcos RAT malware campaign and more broadly, the threat that email-based threats and phishing pose to organizations. To extract credentials and other sensitive information, cybercriminals use phishing and malicious emails as their preferred infection vectors.

U.S. Adds 2 More Chinese Telecom Firms to National Security Threat List
2022-09-21 10:54

The U.S. Federal Communications Commission has added Pacific Network Corp, along with its subsidiary ComNet LLC, and China Unicom Operations Limited, to the list of communications equipment and services that have been deemed a threat to national security. The agency said the companies are subject to the Chinese government's exploitation, influence, and control, and could be forced to comply with requests for intercepting and misrouting communications, without the ability to challenge such requests.

USA adds two more Chinese carriers to 'probably a national security threat' list
2022-09-21 04:58

The US Federal Communications Commission has added two Chinese companies to its list of communications equipment suppliers rated a threat to national security: Pacific Network Corp, its wholly owned subsidiary ComNet LLC, and China Unicom. "Earlier this year the FCC revoked China Unicom America's and PacNet/ComNet's authorities to provide service in the United States because of the national security risks they posed to communications in the United States. Now, working with our national security partners, we are taking additional action to close the door to these companies by adding them to the FCC's Covered List," said Chairwoman Jessica Rosenworcel.

Top 8 takeaways from the VMWare Cybersecurity Threat Report
2022-09-20 14:06

According to VMware, such movements were observed in 25% of all attacks. One of the best things that organizations can do to counter these types of attacks is to look for ways to improve overall visibility.

5 Ways to Mitigate Your New Insider Threats in the Great Resignation
2022-09-15 11:30

Every new employee brings their own security habits, behavior, and ways of work. Maintain best practices - When new employees join the organization, even if security training is well conducted, they're not on par with their peers.

Nation-state attacks are a growing threat to video conferencing
2022-09-08 03:30

Zerify announced the findings of a survey that indicate that IT professionals are becoming increasingly concerned about the growing number of cyber threats and foreign attacks capable of impacting video conferencing. NIST developed a framework for zero trust architecture that should be considered for video conferencing.