Analyzing SonicWall’s Unsuccessful Fix for CVE-2020-5135

Analyzing SonicWall’s Unsuccessful Fix for CVE-2020-5135

Back in September 2020, I configured a SonicWall network security appliance to act as a VPN gateway between physical devices in my home lab and cloud resources on my Azure account. As I usually do with new devices on my network, I did some cursory security analysis of the product and it didn’t take long before I had identified what looked like a buffer overflow in response to an unauthenticated HTTP request. I quickly reported…

Read More

Splunk launches security products and AWS security enhancements

Splunk launches security products and AWS security enhancements

The new offerings are aimed at integrating security data across multiple on-prem and cloud environments and vendors to improve cybersecurity decision-making, the company says. Image: Mackenzie Burke Data analytics and cybersecurity platform provider Splunk announced Tuesday Splunk Security Cloud, a cloud-based security operations platform that integrates analytics, automated security operations and threat intelligence.  “At Splunk, we believe security is a data problem and data drives better decisions, providing the foundation for security analytics,” Sendur Sellakumar,…

Read More

Norway blames China-linked APT31 for 2018 government hack

Norway blames China-linked APT31 for 2018 government hack

Norway police secret service states said that China-linked APT31 group was behind the 2018 cyberattack on the government’s IT network. Norway’s Police Security Service (PST) said that the China-linked APT31 cyberespionage group was behind the attack that breached the government’s IT network in 2018. The attribution of the attack to the APT31 grouo is based on the results of the investigation conducted by the Norwegian intelligence. The threat actors gained administrative rights then used them…

Read More

DockerCon LIVE 2021 Recapped: Top 5 Sessions – Docker Blog

DockerCon LIVE 2021 Recapped: Top 5 Sessions – Docker Blog

You came, you participated, you learned. You helped us pull off another DockerCon — and, my fellow developers, it was good. How good? About 80,000 folks registered for the May 27 virtual event — on a par with last year. We threw a lot at you, from demos and product announcements to company updates and more — all of it focused on modern application delivery in a cloud-native world. But some clear favorites emerged. Here’s…

Read More

7 Tips to Protect Your Smartphone from Getting Hacked

7 Tips to Protect Your Smartphone from Getting Hacked

There’s little rest for your hard-working smartphone. If you’re like many professionals today, you use it for work, play, and a mix of personal business in between. Now, what if something went wrong with that phone, like loss or theft? Worse yet, what if your smartphone got hacked? Let’s try and keep that from happening to you.  Globally, plenty of people pull double duty with their smartphones. In Spain, one survey found that 55% of people use the same phone for a mix of personal and and work activity. The same survey…

Read More

7 Tips to Protect Your Smartphone from Getting Hacked | McAfee Blogs

7 Tips to Protect Your Smartphone from Getting Hacked | McAfee Blogs

There’s little rest for your hard-working smartphone. If you’re like many professionals today, you use it for work, play, and a mix of personal business in between. Now, what if something went wrong with that phone, like loss or theft? Worse yet, what if your smartphone got hacked? Let’s try and keep that from happening to you.  Globally, plenty of people pull double duty with their smartphones. In Spain, one survey found that 55% of people use the same phone for a mix of personal and and work activity. The same survey…

Read More

New Tool Launched to Remove Nude Images of Children Online

New Tool Launched to Remove Nude Images of Children Online

A new online tool has been launched to help young people remove nude images of themselves that have been shared online. The Report Remove tool, developed by Childline and the Internet Watch Foundation (IWF), enables any person under the age of 18 to report any nude image or video of them that has appeared on the internet. The IWF will assess the content, which will work to remove it if it is found to have…

Read More

Fifth of Google Play Apps Violate Child Protection Law

Fifth of Google Play Apps Violate Child Protection Law

One in five apps on Google Play designed for children appear to be breaking federal law, according to new research from Comparitech. The consumer rights and comparison site analyzed the top 300 free and top 200 paid apps on the marketplace under the children and family categories and reviewed each listed privacy policy. It found that one in five contravened the Children’s Online Privacy Protection Act (COPPA), legislation which places a strict set of FTC-enforced…

Read More

Ransomware Payments Could Be Tax Deductible – Report

Ransomware Payments Could Be Tax Deductible – Report

US organizations that choose to pay a ransom to their online extorters may be eligible to claim the money back from the Internal Revenue Service (IRS), it has emerged. A report from The Associated Press over the weekend cited tax lawyers and accountants who claimed the little-known clause could be a “silver lining” for ransomware victims. However, the deduction could also be seen as a further corporate incentive to pay up, encouraging more affiliate groups…

Read More

The Top 5 Vendor-Neutral Cloud Security Certifications of 2019

The Top 5 Vendor-Neutral Cloud Security Certifications of 2019

Most organizations have already begun their shift to the cloud. In its Cloud Computing Survey 2020, for instance, International Data Group (IDG) found that 81% of respondents had at least one workload or segment of their computing infrastructure in the cloud. That percentage could grow by the end of the year, as IDG found that 32% of total IT budgets will go to cloud computing—up from 30% in 2018. But the cloud comes with its…

Read More
1 2,278 2,279 2,280 2,281 2,282 2,644