Google: Incomplete Patches Caused Quarter of Zero-Days in 2020

Google: Incomplete Patches Caused Quarter of Zero-Days in 2020

A quarter of zero-day exploits discovered last year could have been avoided if vendors had taken a more methodical and comprehensive approach to patching, according to Google. Project Zero security researcher, Maddie Stone, argued in a blog post yesterday that 25% of zero-days spotted in 2020 were closely related to previously publicly disclosed vulnerabilities. This means that incomplete patches issued by vendors are effectively allowing attackers to craft follow-up zero-days more easily, in some cases…

Read More

The 2021 Perspective – Challenges and Milestones for The VPN Industry

The 2021 Perspective – Challenges and Milestones for The VPN Industry

By Sebastian Schaub, CEO and Co-Founder, hide.me VPN The worldwide VPN market is conservatively valued at over $20 Billion and is predicted to nearly double in value over the next couple of years or so. As we exit a tumultuous year for businesses of all shapes and sizes, what can we expect to see happening in the VPN market over the next 12 months? Will the rise in cybersecurity threats help to drive uptake of…

Read More

It’s time to rethink cybersecurity training… Again

It’s time to rethink cybersecurity training… Again

It’s time to rethink cybersecurity training… Again | 2021-02-04 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Dashboards: una herramienta eficaz de ciberseguridad

Dashboards: una herramienta eficaz de ciberseguridad

Los datos solo son tan buenos como el uso que se les da. No solo el universo de ciberseguridad recopila datos, también las empresas individuales captan datos de ciberseguridad desde dentro de su organización, así como desde fuentes externas para agregar más contexto y relevancia. Todos los datos deben analizarse para crear información procesable. La información que se ofrece le permite prevenir incidentes y, si puede detectar patrones y anomalías en sus datos, puede ayudarlo…

Read More

Networking software can ease the complexity of multicloud management

Networking software can ease the complexity of multicloud management

Deploying and operating applications in multiple public clouds is critical to many IT leaders, and networking software can help. Migrating applications to cloud infrastructure requires scale, performance, and, importantly, automation. But achieving them all can be challenging due to limited visibility into that infrastructure and the fact that each IaaS platform has proprietary controls for networking and security that can make multicloud operations highly manual and therefore time consuming. As a result, IT teams can…

Read More

Tesla sues former employee for allegedly stealing sensitive docs

Tesla sues former employee for allegedly stealing sensitive docs

Tesla has accused a former employee, a software engineer, of downloading about 26,000 sensitive files and transferring them on his personal Dropbox On Saturday, Tesla sued the former employee Alex Khatilov for allegedly stealing 26,000 confidential documents, including trade secrets. The software engineer transferred the sensitive files to his personal Dropbox account. Khatilov stole files from the internal network of the carmaker, the documents were related to the Warp Drive software. The Warp Drive is…

Read More

Operation NightScout: supply chain attack on NoxPlayer Android emulator

Operation NightScout: supply chain attack on NoxPlayer Android emulator

Experts uncovered a new supply chain attack leveraging the update process of NoxPlayer, a free Android emulator for PCs and Macs. A new supply chain attack made the headlines, a threat actor has compromised the update process of NoxPlayer, a free Android emulator for Windows and Macs developed by BigNox. The company claims to have over 150 million users in more than 150 countries, according to ESET more than 100,000 of its customers have Noxplayer…

Read More

Experts discovered a new Trickbot module used for lateral movement

Experts discovered a new Trickbot module used for lateral movement

Experts spotted a new Trickbot module that is used to scan local networks and make lateral movement inside the target organization. Cybersecurity researchers discovered a new module of the Trickbot malware, dubbed ‘masrv’, that is used to scan a local network and make lateral movement inside the target organization. The masrv module leverage the Masscan open-source utility for local network scanning, it is used to search for other devices with open ports that can be compromised. Once…

Read More

The open-source Magma project will become 5G’s Linux | ZDNet

The open-source Magma project will become 5G’s Linux | ZDNet

5G is one part hardware, one part standards — oh so many 5G standards, and one part software. Indeed, it wasn’t for 5G’s open-source technologies, 5G wouldn’t have gotten off the ground. Now, the software and hardware sides of 5G are getting closer together than ever with the cellular core, network software open-source stack Magma. Magma was developed by Facebook to help telecom operators deploy mobile networks quickly and easily. The project, which Facebook open-sourced…

Read More

Emotet Botnet dismantled in a joint international operation

Emotet Botnet dismantled in a joint international operation

A global operation of law enforcement has dismantled the infrastructure of the infamous Emotet botnet. A global operation of law enforcement, lead by Europol, has dismantled the infrastructure of the infamous Emotet botnet. The Emotet banking trojan has been active at least since 2014, the botnet is operated by a threat actor tracked as TA542. In the middle-August, the malware was employed in fresh COVID19-themed spam campaign Recent spam campaigns used messages with malicious Word documents, or links to them, pretending to…

Read More
1 81 82 83 84 85 268