Security News

The Cusp of a Virtual Analyst Revolution
2021-03-23 14:35

The near future evolution of the Virtual Analyst is being driven by two competing and intwined motions -the growing need for real-time threat response, and the inaccessibility of deep security knowledge and expertise. Although that Virtual Analyst capability will be tightly bound to a product, the second Virtual Analyst motion centers around access to deep security expertise.

Critical Security Bugs Fixed in Virtual Learning Software
2021-03-22 19:01

Netop, the company behind a popular software tool designed to let teachers remotely access student computers, has fixed four security bugs in its platform. "In Netop Vision Pro 9.7.2, released in late February, Netop has fixed the local privilege escalations, encrypted formerly plaintext Windows credentials, and mitigated the arbitrary read/writes on the remote filesystem within the MChat client," according to a Sunday report by the McAfee Labs Advanced Threat Research team, which discovered the flaws.

Windows 10 to let you further customize your Virtual Desktops
2021-03-17 18:05

Microsoft has added new features to Windows 10 Virtual Desktops that allow you to customize them to your liking. Windows 10 currently allows you to create virtual desktops that you can use to launch applications and files that will not appear on your main desktop or other virtual desktops.

Phishing sites now detect virtual machines to bypass detection
2021-03-15 17:20

Phishing sites are now using JavaScript to evade detection by checking whether a visitor is browsing the site from a virtual machine or headless device. Cybersecurity firms commonly use headless devices or virtual machines to determine if a website is used for phishing.

Azure flings out free virtual trusted platform module for cloudy VMs
2021-03-09 05:58

Microsoft has revealed that its Azure IaaS platform now offers free a virtual trusted platform module. Dubbed "Azure Trusted Launch for virtual machines" and launched as a preview on March 8th, Microsoft's CTO for Azure Mark Russinovich said the new offering "Allows administrators to deploy virtual machines with verified and signed bootloaders, OS kernels, and a boot policy that leverages the Trusted Launch Virtual Trusted Platform Module to measure and attest to whether the boot was compromised."

Intel partners with DARPA to perform in Data Protection in Virtual Environments program
2021-03-09 02:30

Intel announced that it has signed an agreement with Defense Advanced Research Projects Agency to perform in its Data Protection in Virtual Environments program. The multiyear program represents a cross-team effort across multiple Intel groups, including Intel Labs, the Design Engineering Group and the Data Platforms Group, to tackle "The final frontier" in data privacy, which is computing on fully encrypted data without access to decryption keys.

Red Hat software now supported on IBM Power Virtual servers
2021-02-24 00:45

IBM announced availability of Red Hat software on IBM Power Systems as well as new IBM Power Systems hardware. New IBM Power Private Cloud Rack solution - Providing clients an optimized, production-level OpenShift platform to modernize traditional environments with cloud-native applications, the IBM Power Private Cloud Rack combines on-premises hardware, a complete software stack of IBM and Red Hat technology, and installation from IBM Systems Lab Services to deliver 49% lower cost per request as compared to similarly equipped x86-based platformsii.

SecurityWeek Announces Virtual Cybersecurity Event Schedule for 2021
2021-02-11 13:32

SecurityWeek today announced its official lineup of virtual cybersecurity events for the remainder of 2021. SecurityWeek's Security Summits series is designed to allow participants from around the globe to immerse themselves in a virtual environment to discuss the latest cybersecurity threats and challenges facing enterprise organizations.

Get your free ticket to Cobalt’s SecTalks virtual conference
2021-02-09 03:45

How can military experience help build resilience in information security? What lessons in perseverance and resilience can we pick up from an aerospace consultant who learned them the hard way in the wake of the NASA Challenger tragedy? Or, perhaps, you want to know more about how pentesting works in practice and hear advice by CISOs on how to manage infosec programs?